KEMBAR78
Comp 9 Notes | PDF | Printer (Computing) | Central Processing Unit
0% found this document useful (0 votes)
67 views165 pages

Comp 9 Notes

The document provides an overview of computer fundamentals, including definitions, uses in various fields such as education and medicine, and the evolution of computers through different eras: Mechanical, Electro-Mechanical, and Electronic. It details characteristics and features of each generation of computers, from the first generation using vacuum tubes to the current fifth generation focused on artificial intelligence. Additionally, it discusses artificial intelligence, its applications, and the classification of computers based on technology.

Uploaded by

Zargham Ali
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
67 views165 pages

Comp 9 Notes

The document provides an overview of computer fundamentals, including definitions, uses in various fields such as education and medicine, and the evolution of computers through different eras: Mechanical, Electro-Mechanical, and Electronic. It details characteristics and features of each generation of computers, from the first generation using vacuum tubes to the current fifth generation focused on artificial intelligence. Additionally, it discusses artificial intelligence, its applications, and the classification of computers based on technology.

Uploaded by

Zargham Ali
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 165

Paragon School System

Subject: Computer

_______________________ :Name

_______________________ :Class

1
(Chapter 1) - FUNDAMENTALS OF COMPUTER
Computer Science 9th - Short / Detailed Question Answers

Q1: What is Computer?


Ans: A computer is an electronic data processing machine or device that performs
processes, calculations, and operations based on instructions provided by a
program.

Q2: Discuss the use of computers in any two fields of life?


Ans: Computers are now used vastly in every field of life. The advancement in
computer used advancement in knowledge, science, and technology. Today,
computers are used in fields of business, industry, education, banking,
transportation, research, explorations, media, entertainment, etc.
Use of Computers in Education:
Computer technology has had a deep impact on the education. Because of
computers, education has become easier and much more interesting than before.
The main uses of computers in education are as follows:
(i) Computer teaching plays a key role in the modern education system. Students
find it easier to refer to the internet than searching for information in fat books. The
process of learning has gone beyond learning from prescribed textbooks. Internet is
a much larger and easier-to-access storehouse of information.
(ii) When it comes to storing retrieved information, it is easier done on computers
than maintaining hand-written notes.
(iii) Computer technology has made the dream of distance learning, a reality.
Education is no longer limited to classrooms. It has reached far and wide.
(iv) Computers facilitate effective presentation of information. Computers facilitate
audio-visual representation of information, thus making the process of learning
interactive and interesting. Computer-aided teaching adds a fun element to
education.
(v) The Internet can be used to refer to information on different subjects. Both
teachers and students benefit from the Internet. Teachers can refer to it for
additional information and references on the topics to be taught.
(vi) Computers enable storage of data in the electronic format, thereby saving
paper. Memory capacities of computer storage devices enable them to store huge
chunks of
data.
Use of Computers in the Medical Sector:
Computers serve as excellent tools for storing patient-related data. Large hospitals
employ computer systems to maintain comprehensive patient records, which often
necessitates keeping detailed medical histories. Doctors frequently require
information about a patient's family history, physical ailments, previously diagnosed
diseases, and prescribed medications.
Medical journals, research papers, diagnostic reports, vital medical documents, and
reference books are best stored in electronic format.
Many of today's medical devices incorporate small, programmed computers. Several
medical appliance’s function based on pre-programmed instructions. Fundamentally,
the circuitry and logic within most medical equipment resemble a computer.

2
Computer software is utilized for disease diagnosis. It can aid in examining internal
organs. Advanced computer-based systems assist in examining delicate organs.
Some complex surgeries are performed with the help of computers.

Various types of monitoring equipment medical imaging are a vast field that deals
with the techniques to create images of the human body for medical purposes.
Many of the modern methods of scanning and imaging 1 are largely based on
computer technology.2 Magnetic resonance imaging and tomography employ
computer software.
In the field of medicine, computers allow for faster communication between a
patient and a doctor. Doctors can collaborate better over the Internet. Today, it is
possible to obtain3 expert opinions within seconds by means of the Internet.
Medical practitioners can discuss medical issues in medical forums. They can
exchange images and messages in seconds 4 and derive conclusions speedily. They
can seek advice and share knowledge in a convenient manner over the Internet.
The importance of computers cannot be stressed enough 5 as computer technology
has revolutionized the field of medicine.6

Q.3: Describe the mechanical era of computer evolution.


Ans: Mechanical Era (Dark Age):
Men have been trying to invent machines that can solve mathematical problems. In
the mechanical era, humans became successful in making simple machines that
could help perform simple arithmetic operations, in other words, computing. These
machines were manually operated since electricity was not invented. 1 Some of the
important machines of this era are:
(a) Abacus (3000 B.C.):
Abacus was invented about 5000 years ago. It is also known as 2 a counting frame.
Abacus is still used to teach basic arithmetic operations to students. Abacus is
considered the first computer prototype.
(b) Napier's Bones (1612 A.D.):
Scottish mathematician John Napier developed Napier's Bones in 1612. It is also
called Napier's Rods. It was a small machine that contained ten rods. The rods were
made3 of bones, wood, or metal. Napier's Bones were used for multiplication and
division.
(c) Slide Rule (1622 A.D.):
English mathematician William Ought red invented the Slide Rule. This was
essentially a pair of two moveable rules placed side-by-side. They had a
standardized set of markings called scales. These scales were used for mathematical
computations. Slide Rules1 were used to multiply and divide numbers. Modern slide
rules are still used in some countries.
(d) Pascaline or Pascal’s Calculator (1642 A.D.):
French mathematician Blaise Pascal invented a mechanical calculator 2 called
Pascaline. He developed this machine to help his father who was a tax collector.
Pascaline could perform addition and subtraction with eight figures. Users had to
adjust wheels in order to perform calculations.
(e) Leibniz's Calculator (1694 AD):
Gottfried Wilhelm Leibniz, a German mathematician, developed Leibniz's Calculator,
also known as the stepped reckoner. It was the first calculator to perform all four
basic arithmetic operations: addition, subtraction, multiplication, and division.
(f) Babbage's Difference and Analytical Engines (1822 and 1837 A.D.):
Charles Babbage, an English mathematician and mechanical engineer, is known as
the Father of Computer for developing the first complete computing machine. His
first invention was the Difference Engine, an automatic mechanical calculator made
of metal and powered by steam. It had a mechanical memory to store data
3
temporarily for processing and results. Users could input calculations and receive
printed results. The Difference Engine worked on difference equations.
In 1837, Babbage designed but couldn't build the Analytical Engine. This proposed
design included an Arithmetic Logic Unit (ALU) and basic programming flow control.
Programmed using punched cards, it contained integrated memory. Historians
consider it the first design concept of a general-purpose computer due to its
comprehensive design

Q.4: Name the eras of evolution of computers?


Ans: Eras of Evolution of Computers:
The computers we see today are a modern form of computers that have evolved
over centuries. The evolution of computers is generally divided into the following
three eras:
1. Mechanical Era (Dark Age)
2. Electro-Mechanical Era (Middle Age)
3. Electronic Era (Modern Age)

Q.5: Describe the electro-mechanical era of computer evolution.


Ans: Electro-Mechanical Era (Middle Age):
This era began in the mid-19th century. During this period, scientists were able to
develop faster and more accurate computing machines as they were powered by
steam and electricity. One such machine was the Tabulating Machine.
Herman Hollerith's Tabulating Machine (1890 A.D.):
Invented by American inventor Herman Hollerith in 1890, Hollerith's first tabulator
was used for the U.S. 1890 Census. It significantly sped up the process, taking only
six months compared to the seven years it took to complete the 1880 census.
Hollerith's Tabulating Machine gained popularity and was used in many U.S.
government offices. It could read and sort data from punched cards.

Q.6: Describe the electronic era of computer evolution.


Ans: Electronic Era (Modern Age):
The advancement in the vacuum or electron tube gave birth to the electronic era. In
this era, the true computers were invented, which worked on the principle of input,
store, process, and output. Continuous advancements 1 in electronic engineering
significantly increased the efficiency and speed of computers. The electronic era
may be categorized into generations based on the core technology used to build
computers.
● The First Generation of Computers (1940 to 1956)
● The Second Generation of Computers (1956 to 1963)
● The Third Generation of Computers (1964 to 1971)

4
● The Fourth Generation of Computers (1971 to Present)
● The Fifth Generation of Computers (Present and Beyond)

Q.7: Describe the characteristics of the first generation of computers and


its main features.
Ans: First Generation of Computers (1940 to 1956):
Based on vacuum tubes, first-generation computers were very large in size. This
generation1 used machine language (i.e., 1's and 0's). Magnetic drums were used as
primary internal storage medium and punched cards for input. 2 This generation
mainly used batch processing operating systems. Computers of this generation were
primarily used for scientific and research purposes. Electronic Numerical Integrator
and Calculator (ENIAC), Universal Automatic Computer (UNIVAC) are examples 3 of
first-generation computers.

MainFeatures:
● Technology Used: Vacuum Tubes
● Size: Very large in size (Mainframe)
● Language: Low-level Machine language (i.e., 1's and 0's)
● Main memory (primary internal storage): Magnetic drums
● External storage: Punched cards
● I/O Device: Punched cards and papers
● Operating system: Batch processing operating system (i.e., human operates
to set system, no proper operating system)
● Use: Scientific and research purpose
● Example: ENIAC, EDVAC, UNIVAC

Q.8: What do you know about the second generation of computers and its
main features?
Ans: Second Generation of Computers (1956 to 1963):
With the introduction of transistors, computers became smaller, faster, cheaper,
and more efficient. Assembly language and a high-level language called FORTRAN
were introduced. Magnetic core was used as the primary internal storage medium.
Punched cards were used for input. Batch processing and Multiprogramming
Operating systems1 were employed. These computers were primarily used for
commercial productions, scientific and engineering analysis, and design. Examples
include IBM 7094 and IBM 1401.
Q.9: Briefly describe the third generation of computers and its main features.
Ans: Third Generation of Computers (1964 to 1971):
The use of Integrated Circuits (ICs) further decreased the size of computers and
increased their speed and efficiency. Less expensive computers were introduced.
High-level programming languages such as Pascal and COBOL were used. 1
Keyboards as input and monitors as output devices eased computer usage. Time-
sharing and Real-time Operating Systems were employed. The use of computers
expanded to database management and automatic industrial control. IBM 360 and
IBM 370 are examples of this generation's computers.

Main Features:

● Technology Used: Integrated Circuits (ICs)


● Size: Mini (decreased size and increased speed and efficiency, less expensive)
● Language: High-level programming languages such as Pascal and COBOL

5
● Main memory (internal storage): PROM and DRAM
● External storage: Floppy disk
● I/O Device: Keyboard (input), Monitor (output)
● Operating system: Time-sharing and real-time (Unix operating system)

● Use: The use of computers was extended to database management and


automatic industrial control
● Example: IBM 360 and IBM 370, TDC-316

Q.10: Describe the characteristics of the fourth generation of computers.


Ans: Fourth Generation of Computers (1971 to Present):
The invention of microprocessors revolutionized the development of computers,
leading to faster, less expensive, smaller, and more reliable machines. They used
semiconductor memories like RAM and ROM, and magnetic storage became popular.
More high-level languages were introduced, such as C, C++, Java, etc. These
computers are used in almost every field of life, like space applications, business,
and art work.
Time-sharing, real-time, and distributed operating systems are used. This
generation also saw the development of graphical user interfaces (GUIs). Examples
are Apple Macintosh and IBM PC.

Main Features:
● Technology Used: Microprocessors
● Size: microcomputer (faster, less expensive, smaller and more reliable)
● Language: More high-level languages like C, C++, Java etc.
● Main memory (internal storage): Semiconductor memories RAM and ROM
(EPROM and SRAM)
● External storage: Magnetic storage
● I/O Device: Monitor (output)
● Operating system: Time-sharing, real-time and distributed operating system,
with development of Graphical User Interfaces (GUIs) (DOS and UNIX)
● Use: in every field of life like space applications, business and art work.
● Example: Apple Macintosh, IBM PC

Q.11: What do you know about the fifth generation of computers?


Ans: Fifth Generation of Computers (Present and Beyond):
Fifth-generation computing devices are still under development. In this generation,
computers will be capable of self-learning, reasoning, and generalization. These
computers or controlled machines like robots will also be able to process human
languages. The branches of AI include: Machine Learning, Deep Learning, Natural
Language Processing, Robotics, and Expert Systems.
Main Features:
● Technology Used: Artificial Intelligence Technology, still being developed
● Size: Very tiny in size
● Language: AI (Artificial Intelligence) includes: Machine Learning, Deep
Learning, Natural Language Processing, Robotics, and Expert Systems. These
computers or controlled machines like robots will also be able to process
human languages.
● Main memory (internal storage): EEPROM, SIMM, DIMM
● External storage: Modified magnetic and optical disk etc.
● I/O Device: Keyboard, pointing device, scanner (input) Monitor, printer
(output) etc.

6
● Operating system: GUI based, Microsoft Windows 95 and onward, Windows
NT.
● Use: In all fields of life. Computers will be capable of self-learning, reasoning,
and generalization.
● Example: laptop, notebook, digital diary, Android, Pocket PC, Palm top,
Humanoid Robots

Q.12: Describe artificial intelligence with examples.

Ans: Artificial Intelligence (AI):

Artificial intelligence (AI) is a broad field within computer science focused on


creating intelligent machines capable of performing tasks typically requiring human
intelligence. As an interdisciplinary science, AI utilizes multiple approaches, with
machine learning and deep learning leading to significant advancements across
various tech industries. While AI encompasses various fields, including robotics, a
common form known as “machine learning” involves training algorithms on large
datasets to recognize patterns and make predictions.

Examples of Artificial Intelligence:

1. iRobot Roomba 980: This smart home robot utilizes AI to scan rooms, identify
obstacles, and determine efficient cleaning routes. It can adapt to room size
and clean autonomously without human intervention.
2. Sophia: A highly advanced social robot developed in Hong Kong, Sophia can
effectively communicate using natural language and express human-like
emotions through facial expressions.

3. A Boston-based company made an AI-powered machine for pathologists. The


company's machine learning algorithms help pathologists analyze tissue
samples and make more accurate diagnoses. The aim is to not only improve
diagnostic accuracy but also treatment. Path AI's technology can also identify
optimal clinical trial participants. Path AI has worked with the Bill & Melinda
Gates Foundation and Philips to develop high-volume prognostic test support
tools and plans for sustainable access to their advanced diagnostic services.

Uses of Artificial Intelligence:

● AI is also used for Machine Learning. It learns from our daily routines and
suggests us different options. Like Google maps suggest the best ways for our
daily commute.
● AI is vastly used in scientific experiments, healthcare, and space technologies.

7
Q.13: Write down the names of different ways of computer classification.
Ans: Classification of Computers:
Computers can be classified into differentials as shown below.

Q.14: Describe the classification of computers according to technology.


Ans: Classification of Computers According to Technology:
According to technology or type of data they handle, computers are classified into
three types.
(a) Analog Computers:
Analog Computers are used to process analog data. Analog data are in the form of
continuously varying physical1 quantities like pressure, temperature, voltage, speed,
and weight.
Examples of Analog computers2 are the speedometer of a car, voltmeter, etc.
(b) Digital Computers:
Digital Computers are the most commonly used type of computers. They are used
to process information with quantities using the binary number system (0's and
1's). Digital Computers are used in homes, 3 educational institutes, offices, business,
scientific fields, etc.
(c) Hybrid Computers:
Hybrid Computers are the combination of Analog and Digital Computer systems. 4
These computers combine analog and digital features of computers in a single
machine. A Hybrid Computer uses analog to digital and digital to analog conversion.
It may input or output either digital or analog5 data.

Q.15: How can we classify computers according to their sizes?


Ans: Classification of Computers According to Size:
Computers are also divided into four groups according to their size:
(a) Super Computers:
Super Computers are the most1 powerful, fastest, and largest computers. They are
extremely expensive. These computers are widely used in scientific applications

8
such as aerodynamics, design simulations, processing of geological data, weather
forecasting, and nuclear research.
(b) Mainframe:
Mainframe Computers are powerful multi-user and multi-processor 2 computers.
They can process huge amounts of calculations at very high speeds. Mainframes are
also very expensive and require a lot of technical expertise to be installed and
operated. They are used in banks and many large business organizations where
several users work simultaneously.
(c) Minicomputer:
These are smaller than mainframe computers, but they are more powerful than
microcomputers. Minicomputers usually1 use a multi-user operating system. Multiple
users can use the minicomputers through terminals. Minicomputers may be used as
network servers and internet servers. DEC VAX and IBM AS/400 are good examples
of minicomputers.
(d) Microcomputers:2
Microcomputers are also called Personal Computers (PCs). The use of
microprocessors3 has made computers cheaper, yet faster and more reliable. These
are the smallest computers designed to be used by individuals. 4 PCs can be used for
a variety of tasks like documentation, calculations, illustration, and entertainment.
The power of networks and the internet has also made them more useful. Now
computers are also used for communication and socialization.

Q.16: Describe the classification of computers according to purpose.


Ans: Classification of Computers According to Purpose:
According to purpose,1computer are either general-purpose or special-purpose.
(a) General-Purpose Computers:
Most computers in use today are General-Purpose Computers. These computers can
process2 a variety of tasks. They can store and execute different programs in their
memory. Therefore, various tasks like word processing (typing & editing), payrolls,
accounts, inventory3 control, manipulating facts in a database, making scientific
calculations and statistical data analysis, and controlling security systems 4 of an
organization are achieved by these computers. Desktops, laptops, tablets, and
smartphones are examples of General-Purpose Computers.
(b) Special-Purpose Computers:
As the name states, Special-Purpose Computers are designed to perform specific
tasks. Special-Purpose Computers5 repeatedly perform a single job more efficiently.
They are also known as Dedicated Computers. These computers are useful in traffic
lights control systems,6 gravitational systems, aviation, weather forecasting,
satellite tracking, and ATMs.

Q.17: Explain the uses of computers in different fields of life.


Ans: Role and Uses of Computer:
The role of computer in our lives is increasing day by day. Different aspects of the
changing role of computer are as follows:
Computers in Different Fields of Life:
We are living today in the information era and the information has become one of
the most valuable assets. To process this information, we make use of computers in
various fields in our daily life. Computers have been integrated in our life in different
shapes and sizes like desktops, laptops, mobile phones, gaming consoles and smart
devices. Our lives have become so dependent of computers that we cannot work
even a single day without the help of it. We have automated many of the repetitive
tasks with the help of more advanced, faster and accurate computers and brought

9
our routine tasks, office work, businesses, researches and industrial applications to
a new level.
Computers are largely used in every field of life. Manufacturing, ecommerce,
education, medical, banking, communication, entertainments engineering.
agriculture, architecture, business, defense, and sports are highly influenced by
computers.
Computers in Today's World:
21th century is the era of technological revolution. In the past technology was only
used to access and share information. However, with the passage of time, the rapid
change in technology has made it nearly impossible to perform any human activity
without its use. Computers are playing an important part in our daily life. News,
weather updates, travelling information and bookings, money transfer and even taxi
bookings are done with the help of mobile phone apps. Many managerial tasks are
also done by computer software. School, library and hospital management are some
examples. Online shopping is becoming a trend in our society too.
Computers are also providing variety of choices for entertainment like online games
in which players from different parts of the world can participate simultaneously. 3D
graphical software has given a new look to movies in which different comic
characters can act with human actors. Photo, sound and video editor software not
only help artists and singers to produce extraordinary creations but also
inexperienced people can enjoy their productivity with ease of use.

Q.18: Discuss the emerging computer technology for tomorrow's world.


Ans: The emerging technologies are also getting better day by day and we can
imagine that how computer will be used in future. Artificial intelligence, robotics,
wireless communication and virtual realities are some areas which are shaping the
modern world.
Artificial Intelligence:
Artificial Intelligence is based on simulating human intelligence in machines that can
easily mimic and execute tasks from simple to more complex operations. The term
Al may also be referred to any machine that displays qualities associated with a
human brain such as learning, reasoning, and problem solving. AT is also used for
machine learning. It learns from our daily routines and suggests us different
options. Like Google maps suggest the best ways for our daily commute. Al is vastly
used in scientific experiment, healthcare and space technologies.
Robots:
Robots are the machines that can be controlled by a computer and are capable of
carrying out a complex series of actions automatically. Robot scan be controlled by
an external control device or through programming. Robotics deals with designing.
creating and programming of the robot and enhancing it by taking sensory feedback
and processing information. Robots are commonly used in manufacturing, industry,
science, medicine and education.
Wireless Communication:
Wireless Communication has become an integral part of our lives. Wireless
communication technology transmits information using electromagnetic waves like
IR (Infrared), RF (Radio Frequency), satellite, etc. Global Positioning System (GPS)
is now used to find real time location of people and objects. Smart phones that
include 3G, 4G and 5G networks have transformed the conventional use of
telephones. These phones not only provide better coverage but also fast mobile
internet experience Wireless Communication is also giving new meaning to the
socialization and human interactivity.
Virtual Reality:
Virtual Reality is an artificial environment that is created with software and
presented to the user in a way that the user feels it as a real environment. Virtual

10
reality can be used for the simulation of a real environment for training and
education. It is also used for development of an imagined environment for a game
or interactive story.

Q.19: Discuss the scope of the different careers in IT sector.


Ans: Careers in IT Field:
Today Computer Science plays a key role in all fields of life. Computer Science (CS)
jobs are ranked as having some of the highest salaries in the world. It's no surprise
that computer science and information technology (IT) are changing tomorrow's job
market. Let's look at different careers that are present in the IT sector.
(i) Software Engineer:
A Software Engineer is a person who uses different programming languages to
develop software products like games, learning management system (LMS),
business applications, educational and entertainment software.
(ii) Network Administrator:
Network Administrator is an IT expert who manages an organization's network. He
or She is responsible for installing, maintaining and upgrading any software or
hardware required to efficiently run a computer network.
(iii) Database Administrator:
A Database Administrator (also known as DBA) is a skilled professional who
maintains a secure database environment in an office, business or organization.

(iv) Web Designer:


Web is short for World Wide Web or www. This is another name for internet. Web
designers are people who build websites. They prepare a site's content with eye
catching designs, attractive images and strong text. They rely on many web
designing tools to ensure an interactive website. How the site works and how it
looks is the responsibility of web designers. They are also responsible for
maintaining and updating an existing site.
(v) Graphic Designer:
Graphic is another word for image. Graphics Designers develop overall layouts of
brochures, magazines and other types of published advertisements and documents.
They do this by using various computer graphics software. This task is usually
accomplished by combining art and technology, conveying ideas through images,
layout of websites and printed matter.
(vi) Information Security Analyst:
These people protect networks.... They plan and carry out security measures to
ensure that no loss of data (or information) occurs. We can call them the police
force of the internet. Computer technology has expanded into online banking and
businesses. Computer hackers are always on the lookout for customer account
details that they can use to steal money. Information Security Analysts ensure that
no such theft occurs.
(vii) Computer Science or IT Teacher:
Another very rewarding career for Computer Science graduates and post- graduates
is teaching in schools, colleges and universities. These instructors instill in their
students the importance of computers in today's world, and the impact these
machines will have in their later lives.

Q.20: Describe computer hardware and their functions.


Ans: Computer Hardware:
Computers consist of software and hardware. Software is the programs and

11
applications that run on computer. Hardware is the physical parts of the computer
that run programs and applications. Hardware can be seen and touched while
software cannot. Computer hardware is a collection of all the physical parts or
components of a computer.
It includes the computer casing, the CPU or Central Processing Unit, computer
memory, VGA graphics card, sound card, and the motherboard.
System Unit:
A System Unit is the part of a computer that contains the primary devices. The
system unit performs operations and produces results for complex calculations. It
includes the motherboard, CPU, RAM and other components, as well as the case in
which these devices are enclosed.
Motherboard:
The motherboard is the main board which connects different parts of computer. It
includes the following general components: Microprocessor (CPU), Slots, Ports,
Buses, RAM, ROM and other electronic components for example resistors,
capacitors, diodes, transistors, jumpers etc. Just like nervous system it allows
communication between all parts of the computer. We can find CPU, memory slots,
expansion slots and a number of chipsets on motherboard. Motherboards are
made of layered fiberglass. These layers contain copper lines that form the circuitry
by which electrical signals are provided to all parts of computer. Various
components of computer may be attached, detached and upgraded on motherboard
according to need of the user. Motherboards also have connectors called ports.
These ports are used to connect input, output and other peripheral devices.

Microprocessor (CPU):
CPU or microprocessor is the brain of computer. The microprocessor is a chip
containing millions of tiny transistors. These transistors manipulate data.
Microprocessor performs all the calculations necessary to make the computer work.
These calculations are performed at very high speed and accuracy. Microprocessor
is made up of silicon. The microprocessor fetches, decodes, executes and stores all
the instructions given by the user or any other device. The speed of computer
mainly depends upon the speed of microprocessor. A microprocessor that has faster
clock speed (measured in GHz) and more cores and cache work faster.

Q.21: Describe the components of a microprocessor.


Ans: There are typically five components of a microprocessor.

12
(a) Arithmetic Logic Unit (ALU):
ALU performs all the actual calculations like arithmetic operations and logical
comparisons. Arithmetic operations include addition, subtraction, multiplication and
division while logical comparisons include comparing, selecting and matching of
data.

(b) Control Unit (CU):


Control Unit is responsible for controlling the transfer of data and instructions
among other units of a computer. This unit controls the operations of all parts of the
computer but does not carry out any actual data processing operations. CU
functions just like a traffic policeman. It manages and coordinates all the units of
the computer.
(c) Clock:
Clock generates pulses and instructions are executed on the basis of pulses. Clock
speed is measure in MHz and GHz.
(d) Registers:
It is a temporary storage area that holds the data that is being processed. It is also
known as programming model which may be of 8 bits, 16 bits, 32 bits or 64 bits.
(e) Cache:
Cache is an intermediate storage area, which is available inside microprocessor. The
immediate processed information is stored in cache. The cache inside the
microprocessor is called internal cache and outside is called external cache.

Q.22: List any five components present on motherboard.

Ans: List of Components Present on Motherboard:

Microprocessor (CPU), Slots, Ports, Buses, RAM, ROM and other electronic
components for example resistors, capacitors, diodes, transistors, jumpers etc.

Q.23: Write a note on input devices.


Ans: Input Devices:
Input devices are used to enter data into computers. These devices can be
categorized into Text Entering, Pointing end Image Scanning Devices.
(1) Text Entering Devices:
Keyboard:
It is the most common text entering device and used to enter data usually in text
format or to perform other controlling functions. When a key is pressed, keyboard
controller chip sends its corresponding code in keyboard buffer called scan code,
which is processed by CPU.
(ii) Pointing Devices (Mouse and its Variants):
They are used for the quick movement of cursor on screen needed usually in
graphic mode. It includes mouse, joystick, track ball and track pad.
(iii) Image Scanners:
Scanners convert image into electronic format understandable by computers
through light sensing. They also work on Optical Recognition which occurs when a
device scans a clear printed surface and translates the image into machine readable
formats that a computer understands. Image scanners include Optical Mark
Recognition (OMR), Optical Barcode Reader (OBR) and Optical Character
Recognition (OCR).
(iv) Others Types of Input Devices:

13
There are also other input devices. For example, microphones are used to accept
sound input and convert it in digital audio format. Microphones are also used for
voice recognition which can convert voice input into text files. Touch Screen is also
used for input. It accepts input directly on monitor by touching finger or any object
on the screen. Magnetic Ink Character Recognition (MICR) and Magnetic Strip
Reader are also used for input.

Q.24: What do you know about output devices?


Ans: Output Devices:
A hardware device that sends data from a computer (CPU) to another device or user
is called an output device. The most common output devices of a computer are
monitor and printer. There are two types of output devices.
(1) Soft Copy Output Devices:
It is screen display or voice output. It is volatile output and lost when other output
is shown or computer is turned off. Following is some of the devices used to give
output in soft form.
(a) Monitors:
It is TV like device that displays data by small bright dots called pixels. Monitors are
of two types.
Cathode Ray Tube (CRT)
Flat Panel Display (FDP)
(b) Data Projectors:
Data projectors are used to show colorful slides and images directly from computer
disk on a wall or large screen through an optical lens.

They are also called digital light projectors and video projectors.
(c) Speakers:
Speakers give output in form of sound. They are good for people with visual
disabilities or where display is not easy.
(ii) Hard Copy Output Devices:
It is output on paper. It is nonvolatile output that is relatively stable and permanent
form. Hard Copy Output Devices are:
(a) Printers:
They usually give output on paper and can print both text and graphics.
There are two types of printers:
Impact, non-impact
(b) Plotters:
Like printer it gives images on paper but typically used to print large format images
such as maps, construction drawing, advertising hoardings etc.

Q.25: What are buses in computer? Define the types of buses.


Ans: Buses:
In computer, Buses are the electric paths on which data is sent and received by
different components. They are just like roads. As roads connect different places,
buses connect all the parts of the computer to each other. They also connect all
internal components on the motherboard. There are three types of buses:

(1) Control bus


(2) Data bus
(3) Address bus
Control Bus: It carries command between different components to control all
activities in a computer.
Data Bus:

14
It carries data between the processor, memory unit and other components.
Address Bus:
It carries the address of the data (but not the data). The address bus is used to
specify memory location to be used by micro-process for specific operation.

Q.26: Which monitor will you prefer in your school: CRT or FPD? Why?
Ans: I prefer FPD (Flat Panel Display) because
1. They take up less desk space and their prices continue to drop.
2. FPDs are more susceptible to accidental or deliberate damage
3. FPDs have more lifetime than CRT.
4. FPDs are, on average, brighter than CRTs.
5. An inexpensive FPD may have a better contrast ratio than an excellent CRT
monitor.
6. Those big CRT monitors also produce a lot of heat, which wastes energy.
7. FDPs consume less power and this can lead to a considerable reduction in the
power bill.

Q.27: Define computer software. Write the names of its types.


Ans: Computer Software:
Software is a set of instructions that a computer uses to perform a task.
It is a general term for a computer program.
There are two main types of software:
1. System Software
2. Application Software

Q.28: Discuss Impact and Non-impact Printers with examples.


Ans: Impact and Non-Impact Printers are two categories of the printer. Impact
printers involve mechanical components for conducting printing. While in non-
impact printers, no mechanical moving component is used.
Impact Printers:
It is a type of printer that works by direct contact of an ink ribbon with paper. These
printers are typically loud but remain in use today because of their unique ability to
function with multi part forms. An impact printer has mechanisms resembling those
of a typewriter.
Examples of Impact Printers:
Dot-matrix printers, Daisy-wheel printers, and line printers.
Non-Impact Printers:
It is a type of printer that does not hit or impact a ribbon to print. They used laser,
xerographic, electrostatic, chemical and inkjet technologies. Non-impact printers are
generally much quieter. They are less likely to need maintenance or repairs than
earlier impact printers.
Example of Non-Impact Printers:
Inkjet printers and Laser printers.

15
Q.29: What is the difference between impact and non-impact printers?

Ans: Difference Between Impact and Non-Impact Printers:

Feature Impact Printer Non-Impact Printer

Printing Produces characters and graphics Produces characters


Mechanism by striking a piece of paper and graphics without
striking the paper

Ink Delivery Prints by hammering a set of Printing is done by


metal pins or a character set depositing ink in
various forms

Mechanical Uses electromechanical devices No electromechanical


Components devices are used

Speed Faster speeds, around 250 words Slower speeds, around


per second 1 page per 30 seconds

Noise Produces noise from the striking Works silently


mechanism

Examples Dot-matrix printers, Daisy wheel Inkjet printers, photo


printers, line inkjet printers, photo printers, laser printers
printers, laser printers

Q.30: Describe storage devices and its types.


Ans: Storage Devices:
A storage device refers to a hardware used to store information. There are two
types of storage devices: Primary and Secondary.
(i) Primary Storage Devices:
Primary storage devices are used by computer during processing. They are quite
smaller in storage capacity. Most primary storage devices are found inside the
computer, and they have the fastest access to data. Primary data include RAM and
ROM.

16
ROM: ROM is the Read Only Memory. It is permanent memory. ROM is quite small
in capacity. It stores the major setting of computer permanently.
RAM: RAM is Random Access Memory. RAM is volatile means it loses its content as
the power supply is disconnected. This is used to store data and instructions
temporarily.
(ii) Secondary Storage Devices:
Secondary storage devices have a larger storage capacity and can store data
permanently. Users save their data on secondary storage devices. Hard Disk, CD
and DVD, SD Card and USB flash disk are examples of secondary storage devices.
Example: Hard Disc, Secure Digital Card, Pen Drive, DVD, CD,

Q.31: Describe the basic operations of a computer.


Ans: Basic Operations of a Computer:
A computer is a machine that acts according to the instructions given by the user. A
computer performs four basic operations: input, processing, output and storage.
(i) Input:
Computer input has many forms. It can be from a command entered using a
keyboard or a mouse. It can be data sent from another computer on a net- work.
(ii) Processing:
Processing is done inside the computer by CPU. Processing is the conversion of input
into output. After processing, data is turned into meaningful information. This is
carried out with the help of arithmetic and logical operations.
(iii) Storage:
Storage refers to the holding or saving data. RAM, ROM and Hard Disk are the
devices that are used for storage.
(iv) Output:
Output is the result of a computer processing. Output may be viewed on a monitor
screen, heard through speakers or printed on paper. Here, monitor screen, speakers
and printer are called output devices.

Q.32: Define and explain system software and its types.

17
Ans: System Software:
System software is a computer program that coordinates all activities and functions
of a computer. It also controls all the operations of the computer hardware. It
includes operating systems, device driver's utility programs and language
translators.
(i) Operating System:
Operating system is the master control program that manages all the system
resources. It creates an interface between computer system and user. Windows and
Linux are commonly operating systems.
(ii) Device Drivers:
Device drivers are computer programs that control a particular device when it is
connected to a computer. Any hardware that we have in our computer must have a
device driver to communicate with operating system. A device driver is a translator
between the operating system and the hardware device. For many devices,
operating system has drivers pre-installed in them. This gave rise to the concept of
plug and play, where the device would be attached to the computer and the
operating system will instantly recognize it. A non-plug-and-play device would
require you to go through several steps of installing drivers and setting up the
device before it would work.
(iii) Utility Programs:
Utility means being useful. Utility programs are useful computer programs that help
to manage, maintain and control computer resources. Operating systems usually
have pre-installed programs that can serve the purpose, but utility software
provides further functionality. One example of utility program is in antivirus
software. This computer program helps to protect a computer from viruses and
other harmful files.
Hard Disk tools are also part of utility programs. They manage hard disk
drives and other storage devices. This includes utilities to scan the hard disks
for any potential problems. Disk cleaner utility is used to remove any
unnecessary files while disk defragmenter is used to re-organize file on a
hard disk drive to increase performance of disk.
(iv) Language Translators:
Language Translators are used to translate human readable instructions into
machine language. Computer can only understand machine language which is
composed of 0's and I's. The computer languages are used to make computer
programs (software).
Generally, software is written in high-level languages, using natural language
words. Language translator is of three types: assembler, compiler and interpreter.
(a) Assembler:
The assembler translates the program written in assembly language into machine
language instructions for execution.
(b) Compiler:
It translates the entire high-level language program at once into machine language
before it is executed.
(c) Interpreter:
It translates the high-level language program line by line into machine language.
Difference Between System and Application Software

S. Key
System Software Application Software
No
1 Definition System Software is the On the other hand,
type of software which is application software is the
the interface between type of software which runs
application software and as per user request. It runs
system. on the platform provided by

18
system software.
2 Development In general, system While in the case of
Language software is developed in application software, high-
low-level language which level language is used for
is more compatible with their development as they
the system hardware in are developed as specific-
order to interact with it. purpose software.
3 Usage System software is used On the other hand,
for operating computer application software is used
hardware. by users to perform specific
tasks.
4 Installation System software is On the other hand,
installed on the computer application software is
when the operating installed according to the
system is installed. user’s requirements.
5 User As mentioned in the above On the other hand, in
Interaction points, system software application software, the
has less or no user user can interact with it as a
interaction available. user interface is available in
this case.
6 Dependency System software can run On the other hand,
independently. It provides application software can’t
a platform for running run independently. They
application software. can’t run without the
presence of system
software.
7 Example Some examples of system On the other hand, some
software are compiler, examples of application
assembler, debugger, software are word
driver, etc. processor, web browser,
media player, etc.

Q.34: Differentiate between compiler and assembler?


Ans: Difference between Compiler and Assembler:
S. Key
Compiler Assembler
No
1 Operation Compiler translates high Assembler converts the
level programming assembly level language to
language code to machine machine level code.
level code.
2 Input Source code in high level Assembly level code as input.
programming language.
3 Conversion Compiler checks and Assembler generally does not
type converts the complete convert complete code at one
code at one time. time.
4 Components Lexical analyzer, Syntax Assembler does works in two
analyzer, Semantic passes.
analyzer, Code optimizer,
Code generator, and Error
handler.
5 Output Mnemonic version of Binary version of , machine
machine code. code.
6 Examples C, C++, Java compilers GAS, GNU assemblers.

19
Q.35: Write the use of these storage devices: Hard Disk, USB Flash
Disk, SD Card.
Ans: Uses of Hard Disk:
 Desktop computers
 Laptop computers
 TV and satellite recorders
 Servers and mainframes
 Portable (external) drives are sometimes used to backup home computers or
transfer large files

Uses of USB Flash Disk:


USB memory sticks-saving and transferring documents etc
They're lightweight and small so we can bring a thumb drive anywhere we go.
Uses of SD Card:
SD and microSD memory cards are often used to record and store photos, music,
videos, apps and files. Both card types can store data taken directly from a device
while users are on the go, such as photos or videos of party, increasing their value
because they allow users to store their memories as they occur. They are mostly
used in smart phones to enhance their storage capacity.

Q.36: Describe application software,


Ans: Application Software:
Application Software is used to complete specific tasks, such as creating documents,
databases, spreadsheets and presentations. Computer games, media players and
web browsers are also the examples of application software. User needs to install
application software to accomplish specific tasks. Application software is not pre-
installed on operating system. They are installed separately. For example, making
spreadsheet is not possible with Windows. For that application software such as MS
Excel is used. There are different types of application software.
(i) Productivity Software:
This kind of application software is used to produce things such as documents,
spreadsheets, databases and presentations. Many of the productivity software are
intended to be used in businesses and offices. MS Office for windows is an example
of productivity software.
(ii) Business Software:
Business Software are used to manage business activities efficiently. It is used to
provide many business functions such as billing database management and
inventory management.
(iii) Entertainment Software:
This type of software provides amusement and fulfills a user's hobby. The most
common entertainment software are video games.
(iv) Educational Software:
Educational software is used for teaching and learning. This kind of software is used
in many schools to enhance knowledge of students in learning different subjects.

20
FUNDAMENTALS OF COMPUTER CHAPTER-1
A. Choose the right answer:
1. The device that converts hard copy into soft copy is:
(a) printer
(b) plotter
(c) scanner
(d) barcode reader

2. Abacus was invented about:


(a) 5000 years ago
(b) 4000 years ago
(c) 3000 years ago
(d) 2000 years ago

3. Media players are:


(a) business software
(b) education software
(c) entertainment software
(d) productivity software

4. The programs that are generally installed to manage and


maintain overall computer resources is:
(a) operating system
(b) utility program
(c) language translator
(d) device driver

5. Modern languages use


(a) compiler
(b) interpreter
(c) converter
(d) assembler

6. A collection of wires connecting the CPU with main memory that is used
to identify particular locations is:
(a) control bus
(b) data bus
(c) address bus
(d) memory bus

21
7. The inexpensive and most commonly used computers are:
(a) super computer
(b) mainframe computer
(c) minicomputer
(d) microcomputer

8. Computer cannot start without:


(a) operating system
(b) utility program
(c) device drivers
(d) business software

9. Graphical User Interface (GUI) was developed in:


(a) second generation
(b) fourth generation
(c) mechanical era
(d) electro-mechanical era

10. A person who uses different programming languages to develop


programs is:
(a) database administrator
(b) web designer
(c) software engineer
(d) graphic designer

(1) Discuss the use of computer in any two fields of life.


Ans. Educational Field:
• Role of computers in education has been given a lot of importance in the recent
years. Computer technology eases the process of learning.
• Many programs are available for students to learn the subjects of Physics,
Mathematics, Chemistry, Biology, etc.
• Multimedia software makes the process of learning interactive and interesting. It
combines text, graphics, sound and video for effective learning.
Internet has enormous information on a wide variety of subjects. Students can refer
to Internet to find information on any topic.
• Nowadays computers with multimedia projectors are being used in classrooms for
effective teaching.
All the activities related to examinations are also being controlled using computers.
Therefore, computer plays an important role in education.
• Today, computer education is a part of curricula from elementary to university
level.

Entertainment Field:
Computers are also providing variety of choices for entertainment like:
(a) Games:
online games in which players from different parts of the world can participate
simultaneously.
(b) Movies:
3D graphical software has given a new look to movies in which different
comic characters can act with human actors in cartoon movies.
Animated films bring a big change in movies industries.

22
Photo, sound and video editor software not only help artists and singers to produce
extraordinary creations but also inexperienced people can enjoy their productivity
with ease of use.
(c) Music:
Different software is developed to compose and listen music e.g Media player.
(d) Drawings and Paintings:
Paint Brush (R.I.P in 2017), Photoshop and other graphic software are used in
making drawings and paintings.

Differentiate Compiler and Assembler

Key Compiler Assembler

Operation Compiler translates high-level Assembler converts


programming language code assembly-level language
to machine-level code. to machine-level code.

Input Source code in high-level Assembly-level code as


programming language. input.

Conversion Compiler checks and converts Assembler generally


Type the complete code at one does not convert
time. complete code at one
time. 1

Components Lexical analyzer, Syntax Assembler 2 works in two


analyzer, Semantic analyzer, passes.
Code optimizer, Code
generator, and Error handler

Output Mnemonic version of machine Binary version of


code. machine code.

Examples C, C++, Java compilers. GAS, GNU assemblers.

Q.32: Define and explain system software and its types.


Ans:

S. Key
System Software Application Software
No
1 Definition System Software is the On the other hand,
type of software which isapplication software is the
the interface between type of software which runs
application software and as per user request. It runs
system. on the platform provided by
system software.
2 Development In general, system While in the case of
Language software is developed in application software, high-

23
low-level language which level language is used for
is more compatible with their development as they
the system hardware in are developed as specific-
order to interact with it. purpose software.
3 Usage System software is used On the other hand,
for operating computer application software is used
hardware. by users to perform specific
tasks.
4 Installation System software is On the other hand,
installed on the computer application software is
when the operating installed according to the
system is installed. user’s requirements.
5 User As mentioned in the above On the other hand, in
Interaction points, system software application software, the
has less or no user user can interact with it as a
interaction available. user interface is available in
this case.
6 Dependency System software can run On the other hand,
independently. It provides application software can’t
a platform for running run independently. They
application software. can’t run without the
presence of system
software.
7 Example Some examples of system On the other hand, some
software are compiler, examples of application
assembler, debugger, software are word
driver, etc. processor, web browser,
media player, etc.

(3) Describe artificial intelligence with examples.


Ans: Artificial Intelligence (AI):
Artificial intelligence (Al) is wide-ranging branch of computer science concerned with
building smart machines capable of performing tasks that typically require human
intelligence. Al is an interdisciplinary science with multiple approaches, but
advancements in machine learning and deep learning are creating a paradigm shift
in virtually every sector of the tech industry. There are many different fields of Al,
including 'robotics', but one of the most commonly known forms is referred to as
'machine learning'. This involves a program applying known information to new
experiences and learning how to take this historical information and its experiences
into account in future actions. Machine learning can find patterns in large amounts
of data that humans might otherwise miss.
Examples of Artificial Intelligence:
(i) A Bedford, Mass. company made smarter home robot, Roomba 980. The
Roomba 980 model uses artificial intelligence to scan room size, identify obstacles
and remember the most efficient routes for cleaning. The self- deploying Roomba
can also determine how much vacuuming there is to do based on a room's size, and
it needs no human assistance to clean floors.
(ii) Hong Kong based company made humanoid robot, Sophia. Sophia is an
incredibly advanced social-learning robot. Through AT, Sophia can efficiently
communicate with natural language and use facial expressions to convey human-
like emotions.
(iii) A Boston based company made AT powered machine for pathologists. The
company's machine learning algorithms help pathologists analyze tissue samples

24
and make more accurate diagnoses. The aim is to not only improve diagnostic
accuracy, but also treatment. Path Al's technology can also identify optimal clinical
trial participants. Path Al has worked with the Bill & Melinda Gates Foundation and
Philips to develop high-volume prognostic test support tools and plans for
sustainable access to their advanced diagnostic services.

(4) Discuss Impact and Non-Impact Printers with examples.


Ans: Impact Printers:
It is a type of printer that works by direct contact of an ink ribbon with paper. These
printers are typically loud but remain in use today because of their unique ability to
function with multi part forms. An impact printer has mechanisms resembling those
of a typewriter.
Examples of Impact Printers:
Dot-matrix printers, Daisy-wheel printers, and line printers.
Non-Impact Printers:
It is a type of printer that does not hit or impact a ribbon to print. They used laser,
xerographic, electrostatic, chemical and inkjet technologies. Non-impact printers are
generally much quieter. They are less likely to need maintenance or repairs than
earlier impact printers.

(5) Write the use of these storage devices: Hard Disk, USB Flash Disk, SD
Card.
Ans: Uses of Hard Disk:
 Desktop computers
 Laptop computers
 TV and satellite recorders
 Servers and mainframes

 Portable (external) drives are sometimes used to backup home computers or


transfer large files

Uses of USB Flash Disk:


USB memory sticks-saving and transferring documents etc
They're lightweight and small so we can bring a thumb drive anywhere we
go.

Uses of SD Card:
SD and microSD memory cards are often used to record and store photos, music,
videos, apps and files. Both card types can store data taken directly from a device
while users are on the go, such as photos or videos of party, increasing their value
because they

(6) Which monitor will you prefer in your school; CRT or FPD? Why?
Ans: I prefer FPD (Flat Panel Display) because
(i) They take up less desk space and their prices continue to drop.
(ii) FPDs are more susceptible to accidental or deliberate damage
(iii) FPDs have more lifetime than CRT.
(iv) FPDs are, on average, brighter than CRTs.
(v) An inexpensive FPD may have a better contrast ratio than an excellent CRT
monitor.
(vi) Those big CRT monitors also produce a lot of heat, which wastes energy.

25
(vii) FDPs consume less power and this can lead to a considerable reduction in the
power bill.

(7) List any five components present on motherboard.


Ans: List of Components Present on Motherboard:
1. Microprocessor (CPU)
2. Slots (PCI slot)
3. Ports (VGA port, USB port, LAN port, Audio in port, Audio out port.)
4. Buses
5. RAM and ROM
6. Other electronic components for example resistors, capacitors, diodes,
transistors, jumpers etc.

(8). Prepare a table of generations.

Generation Period Technology Example of Machine


(Major Inventions)

First 1940-1956 Vacuum ENIAC, UNIVAC


tubes

Second 1956-1963 Transistors IBM 7094 and IBM


1401

Third 1964-1971 Ics IBM 360 and IBM 370

Fourth 1971 to Microprocess Apple Macintosh, IBM


Present ors PC

Fifth Present Artificial Humanoid Robot


and Intelligence
beyond Technology

(9). Give examples of business, education, entertainment, and productivity


software.

S. No Business Education Entertainment Productivity

1. MS Word Tux Paint Media Players CorelDRAW

2. Google Delta Video Games Blender


Docs Drawing

3. MS GCompris Adobe Photoshop PaintShop Pro


Access

4. MySQL MindPlay Inkscape Autodesk1 Maya

Here's the table with the matching columns:

S No A S No B C

26
(i) ALU (d) Perform (i) - (d)
arithmetic and
logical operations

(ii) Input Devices (g) Hardware device (ii) - (g)


that sends data
into a computer

(iii) Secondary (f) Large storage (iii) - (f)


Storage capacity, store
Devices data permanently

(iv) Productivity (e) Helps to produce (iv) - (e)


Software spreadsheets,
database etc.

(v) Mechanical Era (a) Period of (v) - (a)


manually
operated
machines

(vi) Digital (c) Process (vi) - (c)


Computers information using
binary number
system

(vii) Microcomputer (b) PC (vii) - (b)

27
(Chapter 2) FUNDAMENTALS OF OPERATING SYSTEM
Computer Science 9th - Short / Detailed Question Answers

Q.1: Define Operating System. Give three examples of operating systems.

Ans: An Operating System (OS) is a software which performs all the basic tasks like
booting the computer, file management, memory management, process
management, and controlling peripheral devices such as hard disk, printer, etc. It
manages computer resources efficiently.

Examples: Most common operating systems are: DOS, Windows, Linux, Android,
Mac OS, and iOS.

Q.2: List the functions of an OS. Describe them briefly.

Ans: Functions of Operating System:

Operating system manages every activity of a computer. It is the master control


program that provides an interface for a user to communicate with the computer.
System software and application software run on the operating system as shown in
the given figure. Operating System performs the following functions:

1. Booting: The process of starting a computer.


2. Resource Management: Manages hardware and software resources efficiently.
3. User Interface: Provides a user-friendly interface for interaction.
4. Memory Management: Allocates and deallocates memory to processes.
5. I/O Management: Handles input/output operations between the computer and
devices.
6. File Management: Organizes and manages files and directories.
7. Process Management: Manages the execution of programs.
8. User Management: Controls user access and privileges.

(i) Booting:

Booting is a process of starting the computer operating system. It checks the


computer resources and makes it ready to perform different tasks.

(ii) Resource Management:

Operating system manages all the hardware and software resources. This includes
allocation and de-allocation of processor, memory access to shared cache memory
and access to network resources.

(iii) User Interface or Command Interpreter:

We interact with operating system through user interface. Command interpreter is


one of the parts of operating system which reads the commands from user,

28
interprets them and translates them into machine language instructions that the
computer hardware can understand

(iv) Memory Management:

Memory management module performs the task of allocation and de- allocation of
memory space to programs and data in need of these resources.

(v) Input/Output (I/O) Management:

An Operating System provides the device driver to facilitate I/O functions involving
I/O devices. These device drivers are software that control I/O devices through their
controllers

(vi) File Management:

It manages all the file-related activities such as organization storage, retrieval,


naming, sharing, and protection of files.

(vii) Process Management:

A process is a job or activity to be performed by the system. Process management


manages creation, deletion, suspension and resumption of processes. The term
process refers here to program code that has been loaded into a computer's
memory for execution by the central processing unit (CPU). In a multiprogramming
system, there will be a number of computing processes. The operating system must
ensure that each process gets a fair share of the CPU'S time. The OS decides the
order in which processes have access to the processor, and how much processing
time each process should get. This function of OS is called process scheduling.

(viii) User Management:

In modem operating systems, user management describes the ability of


administrators to Control user access to various computer resources like software,
I/O devices, storage system, networks, etc.

Q.3: Define interface and user interface. Describe the types of user
interface.

Ans: Interface:

An interface is a program that allows a user to interact with the computer or


another computer over a network.

User Interface:

A User Interface (UI) is the part of operating system, program, or devices that
allows a user to enter and receive information.

There are many types of User Interfaces. Two most common user interfaces are
discussed below:

(i) Command Line Interface (CLI):

A Command Line Interface (CLI) is a screen or text-based representation in which


the user types the commands on place called prompt to operate the computer.
Command contains string of characters. CLI is difficult to use because the user has

29
to remember the commands and their syntaxes but it is fast in use because text
mode takes less resources. It was primarily provided to users by computer
terminals on UNIX and personal computers including MS-DOS and Apple DOS.

(ii) Graphical User Interface (GUI):

A GUI provides a user-friendly environment where user can interact with computers
through graphical objects such as menus, icons, buttons and other graphical
objects. It is easy to use as users are supposed to just click on a picture to run
commands without memorizing them. GUI is slower than CLI as graphical mode
takes more memory and resources. Windows and IOS are the example of GUI.

Q.4: Differentiate between CLI and GUI. Write any two benefits of each.

Ans: Difference Between GUI and CLI:

S No CLI GUI

1. CLI is difficult to use. Whereas it is easy to use.

2. It consumes low memory. While it consumes more memory.

3. While in it, low precision is obtained.

4. CLI is faster than GUI. The speed of GUI is slower than CLI.

5. Needs only keyboard. Needs both mouse and keyboard.

6. Appearance cannot be Appearance can be modified or changed.


modified or changed.
7. Input is entered only at Input can be entered anywhere on the
command prompt. screen.
8. Information is shown in plain Information can be shown in various
text and files. forms like text, videos, images, etc.
9. No menus provided. Menus are provided.

10. No graphics used. Graphics are used.

11. Does not use any pointing Uses pointing devices for selecting and
devices. choosing items.
12. Spelling mistakes and typing Spelling mistakes and typing errors are
errors are not avoided. avoided.

Q.5: Describe the types of operating system (OS).


Ans. Types of Operating System:
The Operating System can be categorized as under:
• Single User and Multi-user OS
• Batch Processing OS
• Time Sharing OS
• Real Time Processing OS

(i) Single User and Multi-user Operating Systems:

30
In a Single User Operating System, a single user can access the computer system at
a time. These types of operating systems are commonly used. DOS for PCs and
Windows 98 for PCs are example of single user operating system.
A Multi-user Operating System allows multiple users to access the computer at
same time. The operating system manages the memory and resources among the
various users according to the requirement. Linux and UNIX are the most common
examples, of the multi-user operating system

(ii) Batch Processing Operating System:


General term of Batch Processing is used for programs that are executed with
minimum human interaction. This type of operating system does not interact with
the computer directly (see the figure) Each user prepares his job and submits it to
the computer operator. To speed up processing, jobs with similar needs are batched
together and run as a group by an operator. The main function of a batch
processing system is to automatically keep executing the jobs in a batch.

The benefits of batch processing are:


Batch systems can be shared by multiple users.
The idle time for batch system is very less.
Next job starts just after the current one.

(iii) Time Sharing Operating System:

Time sharing is a method that allows multiple users to share resources


simultaneously. Multiple users can use specific computer at the same time in
different places. A time-sharing operating system is that in which from many tasks
each task is given some time to execute so that all processes run smoothly without
any problem. Multiple jobs are executed by the CPU by switching between them. As
the system switches rapidly from one task or user to the other, a short time slot is
given to each task or user for their executions and all feel that system is not shared.
Thus, the user can receive an immediate response.
For example, in a transaction processing, the processor executes each user program
in a short time. These systems are also known as Multitasking Systems.

The task can be from single user or from different users also. The time that each
task gets to execute is called quantum. After this time interval is over OS switches
over to next task.

31
(iv) Real Time Processing Operating System (RT OS):

A Real Time Processing Operating System is a time bound operating system which
has fixed time limit. Processing has to be done within the defined time limit
otherwise system will be failed. Real Time Process System classified into two parts:
Hard Real Time System:
A Hard Real Time System guarantees that critical tasks complete on time, even the
shortest delay or urgency is not acceptable. Here system should meet the deadline.
Missile systems and Air Traffic Control System are best examples of Hard Real Time
System.
Soft Real Time System:
In this time constraint is less strict. The meeting of deadline is not compulsory for
each task, every time. A critical real-time task gets priority over other tasks until it
completes. It does not guarantee that task will be completed in defined time but
before a certain time and according to the priority. Online Transaction System,
Airline Ticket Reservation in which reservation could be delayed but should be done
after checking available seats and completed. before aero plane fight, etc. are the
examples of Soft Real Time System.

Q.6: What is the difference between single user and multi-user OS?
Ans: Difference between Single User and Multi-user OS

Characteristics Single User Operating Multi-User Operating


System System

Definition A Single-User Operating A Multi-User Operating


System is a system in which System is a system that
only one user can access the allows more than one user
computer system at a time. to access the computer
system at a time.
Super User A super user gets all the Super user does not exist
powers of maintaining the when it comes to a multi-
system and making changes user operating system as
to ensure the system runs each user has control over
smoothly. their working.

32
Complexity Single-User Operating System Multi-User Operating System
is simple. is complex.
Performance Only one task at one time gets Schedules different tasks for
performed. performance at 'any' rate.

Example Windows, Apple Mac OS UNIX, Linux and Mainframes

Q.7: If you are a manager of a large organization which type of OS, will you
prefer? Justify your answer with any two reasons.

Ans: If I am a manager of a large organization, I will prefer Windows for operating


system (OS).

Reason of Choosing Windows as OS:


0 Because Windows, in all its varieties, is so widely popular, we are less likely to
have compatibility issues when sharing files with other organizations.
(i) The familiar interface means that there will be less time wasted on learning a
new OS.
(iii) Windows also offers the largest library of commercial software and gives us
access to a large amount of freeware and shareware.
(ii) We'll have more options for hardware with Windows than with any other
operating system. Drivers are easily available, and we can pick and choose our
various components for our PC itself.

Q8: What is the major difference between Soft Real Time and Hard Real
Time systems?

Ans: Difference between Hard Real Time and Soft Real Time System:

HARD REAL TIME SYSTEM SOFT REAL TIME SYSTEM


In hard real time system, the size of
In soft real time system, the size of
data file is small or medium. data file is large.
In this system response time is in In this system response time are
millisecond. higher.
Peak load performance should be In soft real time system, peak load can
predictable. be tolerated.
In this system safety is critical. In this system safety is not critical.
A hard real time system is very A soft real time system is less
restrictive. restrictive.
In case of an error in a hard real time
In case of a soft real time system,
system, computation is rolled back to Satellite
launch, Railway signaling system etc.
are some examples.
Satellite launch, Railway signaling DVD player, telephone switches,
system etc. are some examples. electronic games etc. are few examples.

33
Q.9: Write down the major steps for installing MS-Office.
Ans: Major Steps for Installing MS-Office:
To install MS-Office package we need to take following steps.
1. Run the MS-Office setup from USB, DVD or Hard Disk backup.
2. Check the box marked, accept the terms of this agreement
and click on 'Continue'
3. Eriter Product Key
4. Click on Install Now or Customize procedure.
5. Select the package which you want to install. Click on 'Install Now'.
6. Then installation begins.
7. MS Office installer will notify automatically after finishing the installation.

Before installing MS-Office we should make sure that hardware and software meet
with the minimum requirements for the version of MS-Office that we want to install.
The minimum requirements may differ from version to version. (For MS- Office
2013 the minimum requirements are: 1.6 GHz processor, 1 GB RAM, 3 GB hard disk
free space, minimum windows 7 operating system and graphics driver).
Q.10: What will be the minimum configuration for installing Windows 10 OS?
Ans: Minimum Configuration for Installing Windows 10 Operating System:
Operating system is the most essential software and there are many operating
systems available. Windows is the most commonly used operating system which is
developed by Microsoft. Choosing an operating system depends upon the hardware
that we have. To maintain compatibility between hardware and software, the
operating system vendor specifies the minimum hardware requirement. For
installing Windows 10, we will need at least the following configuration.

Component Requirement
Processor 1GHz (or faster)
Memory (RAM) 1GB for 32-bit or 2GB for 64-bit
Storage 32GB hard disk space
Graphics Card DirectX 9 or later with WDDM 1.0 driver
Display 800 x 600 pixel resolution

Q.11: Write down the major steps for installing Windows OS.
Ans. Major Steps for Installing Windows:
1. Insert the Windows Installation DVD/Flash Drive
2. Restart your computer
3. Wait for the first startup screen
4. Press or hold Del or F2 to enter the BIOS screen
5. Locate the Boot order/ Boot sequence
6. Select Boot order/ Boot sequence as per your installation source
a) USB Flash/USB Hard Disk
b) USB CD/DVD ROM
c) Internal CD/DVD ROM
7. Select any option:
a) Upgrade
b) Customize Installation (Advance)
8. Select any drive for installing your operating system
9. Follow the on-screen instructions.

Q.12: Define the process of software installation.


Ans: Software Installation:

34
Software installation is the process of making programs ready for execution.
Software installation or installer is a computer program that instalis files, such as
applications, drivers, or other software, onto a computer. Software is installed on to
computer by various means. They can be downloaded from the internet. They can
also be installed from an installation CD or DVD or from a USB flash drive.

Q.13: Why it is important to install an antivirus?


Ans: Installing Antivirus:
To keep our computer secure and free from viruses, we need to install an antivirus
software. A number of free antivirus software are available online. AVG, Avast, Avira
and Kaspersky are some of the free antivirus software.
These days we need to download installation file from respective antivirus software
and run it but make sure that computer has the access of internet. After running the
installation file, antivirus software will be automatically installed on our computer.
Most important component of an antivirus software is the virus database which
antivirus software updates time to time. We must update our virus database for
preventing virus threats.

Q.14: What is the purpose of office automation software? With examples,


explain how can office automation help employees to be productive and
efficient?
Ans: Office Automation Software:
Windows is an Operating System which needs to install other software to make the
best use of our computer. Office Automation software is the most common software
package that we install on our computers. Office Automation software is a group of
computer programs that help users in their daily work. Generally, you will find MS
Office in school lab offices and other places.
Purpose of Office Automation:
Office automation eases organizational workloads by simplifying and automating
processes like accounting, data management, training, facility management, and
various administrative tasks.
Office Automation Helps Employees to be Productive and Efficient:
An office automation system doesn't consist of just going paperless. For example,
maintaining all work product and client correspondence in a document management
system. Yet, an office automation system offers organizations much more than
going green by cutting down on paper. It is a powerful tool that can be used to
eliminate manual processes, identify inefficient work flows, and facilitate informed
decision making. Implementing an office automation system offers organizations a
broad range of benefits.

These benefits include:


1. Improved accuracy
2. Reduced costs
3. Reduced time and resources
4. Data storage and management
5. Data insights and more informed decisions
6. Business process improvement

Improved Accuracy:
Humans make errors, properly implemented automated systems do not. Human
errors are not only inefficient in that they must be corrected and lead to productivity
delays, but they can be costly. For instance, adding too many digits when paying an
employee or vendor. Serinus mistakes can lead to security and compliance issues,
potentially fines and penalties. An office automation system limits human
intervention in the transfer of data, which minimizes the occurrence of errors.

35
Reduced Costs:
By automating complex business processes, organizations don't need to invest as
much into hiring for those tasks. As a result, operational costs are lower, while
productivity and profit margins are significantly higher.

Reduced Time and Resources:


Through automation, organizations can accomplish more with less. By eliminating
tedious and time-consuming processes, employees can spend their time on more
high value tasks. For example, returning to the popular paperless benefit, with
office automation software employees do not need to spend as much time collecting
important documentation, entering that information, or filing away voluminous
paper copies. The system does it for them.
Data Storage and Management:
Office automation systems simplify data storage while giving organizations the
ability to monitor and control data through an electronic document management
system. Common features include things like task management and reminder
systems, as well as easy access to information by key stakeholders.

Data Insights and More Informed Decisions:


Office automation systems give organizations access to large data sets, reports, and
analytics. Access to data enables more informed decisions. Moreover, by analyzing
data and key performance indicators, organizations can implement improvements to
their processes to remove bottlenecks and other inefficiencies.
Through business process improvement, organizations optimize performance,
improve the quality of their products or services, and ensure a higher level of
compliance. The ability to improve business processes is what separates office
automation systems from piecemeal automation technology.

Q.15: List the programs available in Ms. Office and write why each program
to be used?
Ans: Ms. Office contains:

S. No Ms. Office Users


Program
1. MS Access It is a database management system.
2. MS Excel It is a spreadsheet.
3. MS OneNote It gathers user’s notes (handwritten or typed),
drawings, screen clippings and audio
commentaries.
4. MS Outlook It is often used mainly as an email application, but
it also includes a calendar, task manager, contact
manager, note taking, journal, and web browsing.
5. MS PowerPoint It is a slide show and multimedia presentation
program.
6. MS Project It is a project management software product. It is
designed to assist a project manager in
developing a plan, assigning resources to tasks,
tracking progress, managing the budget, and
analyzing workloads.
7. MS Publisher It is an entry-level desktop publishing application.
8. MS Visio It is a diagramming and vector graphics
application.
9. MS Word It is a word processor.

36
FUNDAMENTALS OF OPERATING SYSTEM Chapter-2
A. Choose the right answer:
1. The software which performs all basic tasks is:
(a) Antivirus
(b) Start menu
(c) Operating system
(d) Office automation

2. A program that enables user to interact with computer is called:


(a) My document
(b) Start menu
(c) Desktop
(d) Interface

3. The process of checking computer, starting operating system and


making it ready to work is referred to as:
(a) Resource management
(b) Booting
(c) Error checking
(d) File management

4. The number of user(s) that can access the resources simultaneously on a


multiuser OS is/are:
(a) One
(b) Two
(c) Many
(d) Only administrators

5. Which management controls the dynamic allocation and de-allocation of


processor, memory, etc?
(a) Resource
(b) File
(c) I/O
(d) User

6. In which operating system jobs are executed in groups?

37
(a) Batch Processing
(b) Time Sharing
(c) Single User
(d) Real Time

7. The system that guarantees that critical tasks should be completed


without shortest delay is:
(a) Batch processing
(b) Hard real time
(c) Soft real time
(d) Time sharing

8. DOS is an example of:


(a) Real Time Processing OS
(b) Multi Processing OS
(c) Single User OS
(d) Multi User OS

9. The group of programs that helps office workers to do a number of


routine tasks easily and efficiently is called:
(a) Operating system
(b) E-mail
(c) Antivirus
(d) Office automation

10. The operation system that allows frequent switching from one task to
another is:
(a) Batch Processing
(b) Real Time Processing
(c) Single User
(d) Time Sharing

B. Respond the following:

(1) Define Operating System. Give three examples of operating systems.


Ans: Operating System (OS):
An Operating System is a software which performs all the basic tasks like booting
the computer, file management, memory management, process management, and
controlling peripheral devices such as hard disk, printer, etc. It manages computer
resources efficiently.
Examples: Most common operating systems are: DOS, Windows, Linux, Android,
Mac OS and IOS.

(2) List the functions of an OS. Write the briefly about any two.
Ans: Functions of Operating System:
Operating system manages every activity of a computer. It is the master control
program that provides an interface for a user to communicate with computer.
System software and application software run operating system as shown in the
given figure. Operating System performs the following functions.
1. Booting
2. Resource Management
3. User Interface
4. Memory Management

38
5. I/O Management
6. File Management
7. Process Management
8. User Management

Booting:
Booting is a process of starting the computer operating system. It checks the
computer resources and makes it ready to perform different tasks.

Resource Management:
Operating system manages all the hardware and software resources. This includes
allocation and de-allocation of processor, memory access to shared cache memory
and access to network resources.

(3) Which resources are managed by Resource Management function of


OS?
Ans: Resource Management:
Operating system manages all the hardware and software resources. This includes
allocation and de-allocation of processor, memory access to shared cache memory
and access to network resources.
If I am a manager of a large organization, I will prefer Windows for operating
system (OS).
Reason of Choosing Windows as OS:
(0) Because Windows, in all its varieties, is so widely popular, we are less likely to
have compatibility issues when sharing files with other organizations.
(il) The familiar interface means that there will be less time wasted on learning a
new OS.

(6) What is the purpose of office automation software? With examples,


explain how can office automation help employees to be productive and
efficient?
Ans. Office Automation Software:
Windows is an Operating System which needs to install other software to make the
best use of our computer. Office Automation software is the most common software
package that we install on our computers. Office Automation software is a group of
computer programs that help users in their daily work. Generally, you will find MS
Office in school lab offices and other places.
Purpose of Office Automation:
Office automation eases organizational workloads by simplifying and automating
processes like accounting, data management, training, facility management, and
various administrative tasks.
Office Automation Helps Employees to be Productive and Efficient:
An office automation system doesn't consist of just going paperless. For example,
maintaining all work product and client correspondence in a document management
system. Yet, an office automation system offers organizations much more than
going green by cutting down on paper. It is a powerful tool that can be used to
eliminate manual processes, identify inefficient work flows, and facilitate informed
decision making. Implementing an office automation system offers organizations a
broad range of benefits.
These benefits include:
1. Improved accuracy
2. Reduced costs
3. Reduced time and resources
4. Data storage and managernent

39
5. Data insights and more informed decisions
6. Business process improvement

(7) Why it is important to install an antivirus?


Ans: Importance to Install Antivirus:
To keep our computer secure and free from viruses, we need to install an antivirus
software. A number of free antivirus software are available online. AVG, Avast, Avira
and Kaspersky are some of the free antivirus software.
These days we need to download installation file from respective antivirus software
and run it but make sure that computer has the access of internet. After running the
installation file, antivirus software will be automatically installed on our computer.
Most important component of an antivirus software is the virus database which
antivirus software updates time to time. We must update our virus database for
preventing virus threats.

C. Match the column:

S. A S No B C
No

(i) CLI (a) Time bond (i) - (f)


operating
system.

(ii) Windows (b) Office (ii) - (d)


automation

(iii) Process (c) Function of (iii) - (e)


operating
system

(iv) Ms. Excel (d) Operating (iv) - (v)


system

(v) Real time (e) A job to be (v) - (a)


processing performed by
operating the system.
system

(vi) Input/Output (f) Interface (vi) - (c)


Management

40
(Chapter 3) - OFFICE AUTOMATION
Computer Science 9th - Short / Detailed Question Answers

Q.1: What is a word processor? Write any three applications of a word


processor.

Ans: Word Processing refers to the act of using a computer to create, edit, save and
print documents. Specialized software (known as a Word Processor) is needed. One
example is Microsoft Word, but others include Works Word Processor, Open Office
Writer, Word Perfect and Google Drive Document.

Applications of a Word Processor:

A Word Processor allows users to create a 1 variety of documents including reports,


letters, memos, newsletters, brochures, etc. It also allows for adding content such
as pictures, tables, charts, and decorative items like borders and clipart.

The editing and formatting capabilities are powerful. Text can be inserted, edited,
moved, copied, or deleted. Most word processors have spell-check, grammar-check,
dictionaries, and other writing tools.

Q.2: What do you know about MS Word?

Ans: Microsoft Word (MS Word) is a famous word-processing software first released
in the early 1980s by Microsoft. It allows users to type text and manipulate it. MS
Word introduced the concept of WYSIWYG (What You See Is What You Get) by
introducing text formatting and document preview. It has advanced features like
tables, images, advanced formatting, and reviewing, allowing users to customize
their documents. Latest versions come as a part of Microsoft Office Suite. MS Word
is still the most widely used word-processing software.

Q.3: Discuss the Page Layout Tab in MS Word. How many groups does this
tab have? Name them.

Ans: Page Layout Tab:

The Page Layout Tab allows users to control the look and feel of their document.
Users can set margins, apply themes, control page orientation and size, add
sections and line breaks, display line numbers, and set paragraph indentation and
lines.

The Page Layout tab has five groups of related commands namely:

41
Here is the text from the image:

(i) Themes (ii) Page Setup (iii) Page Background (iv) Paragraph (v) Arrange

Q.4: Describe Themes Group in the Page Layout Tab.

Ans: Themes Group:

A theme is a predefined set of formatting, colors, and settings that


changes the overall design and look of the entire document. Applying themes to our
work gives it a professional look. 1 There are different themes available relevant to
the type of document being composed.2

Q.5: What does Page Setup Group do? Name the


options in Page Setup Group.

Ans: Page Setup Group:

Page Setup settings help us set the page layout properties


such as margins, orientation, and size. The settings in this section are often applied
throughout the document.3

The Page Setup Group has seven options:

(i) Margins (ii) Orientation (iii) Size (iv) Columns (v) Breaks (vi) Line Numbers
(vii) Hyphenation

Here is the text from the image:

Q.6: Discuss the Margins and Paper Size options in the Page Setup group.

Ans: Margins (HOTKEY: ALT + P + M):

A margin is the area or space between the main content of a page and the page
edges. This button is used to change the margins of the
entire document or selected section.1

Size (HOTKEY: ALT + P + S + Z):

The size button is used to choose the size of the paper for
the current section or entire document.

Q.7: Name and describe two options in Orientations.

Ans: Orientation (HOTKEY: ALT + P + O):

42
Page orientation or print orientation is the placement of contents on a page. This
button sets the contents of the page or section in portrait (Vertical) or landscape
(Horizontal) layouts.2

Here is the text from the image:

Q.8: How can we apply Margins in a document?

Ans: Apply a Predefined Margin Setting

1. Select Layout → Margins.


2. Select the margin measurements you want.
Create a Custom Margin

1. Select Layout → Margins.


2. Select Custom Margins.
3. In Margins, use the Up and Down arrows to enter the values you want.
4. Select OK when done.1
Change Default Margins

1. Select Layout → Margins → Custom Margins.


2. Set your margins.
3. Select Set as Default.
4. Confirm your selection.

Q.9: Explain the 'Column' option in the Page Setup group.

Ans: Column (HOTKEY: ALT+P+J):

This button is used to split the text into two or more vertical columns. As we format
our documents in Word, we may find it better to lay out our text in columns. This is
usually done if we are developing a newsletter or a
magazine layout. The number of columns we use is up
to us. To add columns, we follow these steps:

(i) Position the insertion point at the beginning of the


material we want to appear in columns.

(ii) Choose the Page Layout tab on the ribbon.

(iii) In the Page Setup group, click the Columns drop-


down list.

(iv) Pick the number of columns we want to use for the


selected text.

(v) When we do step (iii) we can select the most common numbers of columns (1,
2, or 3). If you want more columns then these, click the More Columns option in

(vi) In step (iv) and we will see the Columns dialog box
where you can set up to 45 columns.

Q.10: Describe the different types of breaks in MS


Word.

Ans: Breaks (HOTKEY: ALT + P + B):

43
Breaks button is used to insert page, section or column breaks in the document.
When we are working on a multi-page document, there may be times when we want
to have more control over how exactly the text flows. Breaks can be helpful in these
cases. There are many types of breaks to choose from depending on what
1
we need, including page breaks, section breaks, and column breaks.

Here is the text from the image:

Q.11: Discuss the Line Numbers and Hyphenation option in Page Setup
group.

Ans: Line Numbers (HOTKEY: ALT + P + L + N):

This button is used to add line numbers on the left side of each line of the
documents.

Hyphenation (HOTKEY: ALT + P + H):

This button is used to specify how hyphenation in a document should be applied.

Q.12: What does Page Background Group do? Name the


options in Page Background Group.

Ans: Page Background Group:

These settings are used mostly for special documents such as


certificates, invitations, brochures, essays, etc. It consists of 3 buttons namely,
Watermark, Page Color and Page Borders1 which can bring changes or add anything
to the background of our document.

Q.13: Why do we use Watermark in a document? Give some examples of


Watermarks. How can we use Watermark in MS Word?

Ans: Watermark in a document:

A watermark is a faded background image that displays behind the text in a


document. It is simply that image or text that appears mainly behind the main
document. Watermarks are normally used to prevent counterfeiting. What
watermarking does is to prevent or make it difficult for people to use these
documents as their own. Microsoft Word has some in-built watermarks that can be
chosen. For instance, the in-built watermarks options include draft, confidential and
other functionalities.2

For instance, watermark documents will normally display the status of the document
like "confidential", "Draft" among others. It is important to note that watermarks
can be in form of texts or even images like logos, 3 pictures and other things of
value.

Watermark (HOTKEY: ALT + P + P + W):

This button is used to insert logos, images or text behind the contents of a page.

44
Q.14: Discuss the Page Color and Page Border options in Page Background
group.

Ans: Page Color (HOTKEY: ALT + P + P + C):

This button is used when a user wants to apply a color for the background of the
page.

Page Border (HOTKEY: ALT + P + P + B):

Border button is used to put a border around the page.

Here is the text from the image:

Q.15: Describe the Paragraph group in MS Word and its options.

Ans: Paragraph Group:

The Paragraph Group is where we can modify all the


settings of the paragraphs that appear in our
document. This allows us to set a few basic paragraph
styles and also adjust the indents and1 spacing.

Indent Left (HOTKEY: ALT+P+I+L):

Indent Left is used to define amount of blank space (in centimeters) used to
separate a paragraph from left margin.

Indent Right (HOTKEY: ALT+P+I+R):

Indent Right is used to define amount of blank space (in centimeters) used to
separate a paragraph from right margin.

Space Before (HOTKEY: ALT+P+S+B):

Space Before is used to indicate how much space (in points) is added before the
selected paragraph.

Space After (HOTKEY: ALT+P+S+A):

Space After is used to indicate how much space (in points) is added after the
selected paragraph.

Q.16: What does Arrange Group do?

Ans: Arrange Group:

The buttons in Arrange Group help the users to


quickly arrange graphical and other elements of the document in relation to the
main textual content.2

Q.17: List and define Position and Wrap Text options in Arrange group.

Ans: Position (HOTKEY: ALT+P+P+O):

Position is used to place an object (picture or shape) on the page Position wherever
you want.

45
Wrap Text (HOTKEY: ALT+P+T+W):

Text wrapping is used to arrange the text around an object like an image.

Q.18: Differentiate “Bring Forward” and “Send Backward” options in the


Arrange group with examples.

Ans: Bring Forward (HOTKEY: ALT+P+A+F):

It brings a selected object in front of all other objects.

Send Backward (HOTKEY: ALT+P+A+E):


It brings a selected object behind all other objects.

Q.19: Discuss the Selection Pane, Align, Group and Rotate options in
Arrange group.

Ans: Selection Pane (HOTKEY: ALT+P+A+P):

Selection Pane is used to select, show, hide and change the order of objects in the
document.

Align (HOTKEY: ALT+P+A+A):

Align is used to place objects like pictures, shapes, icons, etc. in alignment with
margins, edge, or relative to another object in the document.

Group (HOTKEY: ALT+P+A+G):

Group is used to combine two or more objects together so that can be treated as a
single object.

Rotate (HOTKEY: ALT+P+A+Y):

46
Rotate is used to rotate or flip the selected object.

Q.20: Discuss ToC. How can it be used in MS Word?

Ans: Table of Contents (ToC):

A Table of Contents (ToC) is an organized listing of the sections, groups and


headings of content in a document and identified by page numbers where they are
placed. It provides an overview of the document and allows readers to go directly to
specific section or content in the document. ToC usually appears after the Title Page
in a document. MS word 2010 provides an advanced feature for automatically
creating a TоС. A user can create an Automatic or a Manual table of contents in a
document. To create a Table of Contents in MS Word document, go to the
References Tab where Table of Contents button appears as the first option of that
tab. MS Word provides several options of creating a ToC that include Automatic
Table creation, Manual Table creation or the user can even create a Customized
Table of Contents based on the requirements of the document.

(i) Automatic, Table:

Automatic Tables creates a Table of Contents automatically based on the content


used as Heading presets of MS Word. Based on the type of Heading, Automatic
Table of Contents will create the appropriate levels and show page numbers where
those Headings are placed. The only difference between Automatic Table 1 and
Automatic Table 2 is the title of the table that is "Contents" or "Table of Contents".

(ii) Manual Table:

Choosing Manual Table from the Table of Contents menu will create a template of a
generic table of contents. This table will need to be edited and defined manually by
providing all the headings, sub-headings and page numbers. To extend the table,
simply copy and paste the template lines and edit them to preserve proper
formatting.

Q.21: In what way does a ToC help book reader?

Ans: The table of contents serves two purposes:

It gives users an overview of the document's contents and organization.

It allows readers to go directly to a specific section of a document

The table of contents typically includes only major sections of the document,
through in some cases an expanded table of contents that provides a more detailed
view of a complex document may be desirable.

47
A table of contents is particularly useful when a document is divided into multiple
pages. A table of contents provides links to sections of the same document. Those
sections could be located on the same documents easily.

Q.22: How can we type in Urdu and Sindhi Languages in MS Word?

Ans: Typing in Urdu and Sindhi Languages:

MS Word 2010 helps in writing letters, applications, CVs, question papers and books
in default language set by Microsoft Windows (that is usually English). MS Word
2010 also supports typing text in various other languages like Urdu and Sindhi. To
be able to write in other languages, the keyboards for those languages have to be
installed in Microsoft Windows. MS Word also supports changing and setting its
default language. To change the default language, go to the File menu and select
Options. From the Word Options dialog box, select Language tab. Now choose one
of the available languages as the default Language for MS Word 2010.

Q.23: What is MS Excel?

Ans: MS Excel 2010:

Microsoft Excel (MS Excel) is a software that uses spreadsheet system to organize,
display, format and calculate data using advanced features and formulas. MS Excel
is a part of Microsoft Office Suite and integrates with other applications in the Office
Suite. MS Excel offers advanced features to perform calculations, visualize data in
graphs and create pivot tables. It efficiently makes use of spreadsheets to organize,
analyze and store data in tabular and graphical forms. It is the most widely used
spreadsheet system and has a high demand in many organizations for keeping
records of data and presenting them as tables and graphs.

Q.24: List four uses of spread sheets in business.


Ans: Common uses of spreadsheets in business are:
1. storing data for example: a list of clients, contact information, employee
timesheets, sales, and purchases.
2. manipulate and analyze data
3. presentation / visualization
4. modeling and planning

48
5. business accounts and budgeting
6. preparing wages
7. making invoices
8. statistical analysis and reports making.

Q.25: What is sorting? How can we short a list in MS Excel?


Ans: Sorting:
Sorting is the process of rearranging or reordering data based on different criteria
like side, quality, value and quantity.
Sorting Lists in MS Excel:
MS Excel has the ability to sort data according to the needs of the user. To help
better understand this concept, take or create a list of products with their unit
prices and quantities as shown below.
The objective is to sort this list of products with prices and quantities, in
alphabetical order based products. To achieve this, first select all the rows and
columns which make up this product list then go to the Data tab and select the Sort
option. In the sort dialog box, choose product from the sort by dropdown list and
make sure that in the Order dropdown list, A to Z is selected Our data will be
rearranged and sorted alphabetically based on the values in Product column and
their respective prices and quantities will also be rearranged as sorted data (as
shown in the figure here). This data can also be sorted in terms of unit price and
quantity.

49
Q.26: How can a user perform calculations in MS Excel?
Ans: Formulas:
MS Excel 2010 allows its user to perform numerous calculations on data. Common
calculations include addition, subtraction, multiplication and division. Comparison of
two numbers and finding their average is also possible. Formulas tell MS Excel what
calculation needs to be performed on the data. Formulas always start with an equal
sign (=). They are defined in the Formula Bar.
To understand this concept, take an example of two numbers, high are 220 and 87,
placed in columns A2 and B2, respectively. The objective is to add these two
numbers using MS Excel formula. To achieve this, follow these steps:
a. Select cell C2.
b. Type (equal sign).
c. Select cell A2 in the worksheet by using the mouse or the keyboard.
This action places the cell reference A2 in the formula of selected cell.
d. Type +
e. Select cell B2 in the worksheet by using the mouse or the keyboard to
put that cell's reference in the formula of selected cell.
f. Press Enter.
g. The answer (307) will be calculated by MS Excel and displayed in the
selected cell (C2) where the addition formula was composed. Likewise
subtraction, multiplication, division and other mathematical functions
can be applied.

Q.27: Write steps that will multiply 37 by 15 using the formula bar in MS
Excel.
Ans: Multiplying 37 by 15 using the formula bar in MS Excel:
a. Type 37 in cell A1.
b. Then, type 15 in cell B1.
c. Then select cell C1.
d. In formula bar, type = (equal sign).
e. In formula bar, after = type A1 B1
f. Press enter.
g. The answer (555) will be calculated by M.S Excel and displayed in the
selected cell (C1).
h.

Q.28: Why do we use charts in MS Excel?


Ans: Charts:
Charts are also known as graphs. They include diagrams and tables. Charts feature
in MS Excel allows the users to present a set of data visually. A huge set of data

50
may not succeed in presenting its meaning to the reader whereas visual information
helps better understand those data values at a glance. To understand this concept
take an example of the average monthly temperature for Larkana 2018 as shown
below:

S. No Month Temp S. No Month Temp

1. January 23’C 7. July 41’C

2. February 26’C 8. August 39’C

3. March 32’C 9. September 39’C

4. April 38’C 10. October 36’C

5. May 43’C 11. November 31’C

6. June 44’C 12. December 24’C

The temperature table contains data in a form which is not very helpful for every
user to understand. If the same data is converted into a graph or chart, the user-
would be better able to reach a conclusion. From the bar chart, we can easily derive
the hottest and the coldest months and compare them with each other.
The same data, if displayed as a graph or chart, will give more meaning and a user
can easily derive an understanding of such values at a glance as seen in the below
figures.

51
OFFICE AUTOMATION CHAPTER-3
A. Choose the right answer:

1. Which chart will be suitable to show the share of three partners in a


business?

2. The software that used for accounting purpose is:

(a) MS Word
(b) MS Excel
(c) MS PowerPoint
(d) MS Access

3. The software that is used to format a document is:

(a) MS Word
(b) MS Excel
(c) MS PowerPoint
(d) MS Access

52
4. The special character that initiates the formula mode in a cell is:

(a) /
(b) =
(c) –
(d) *

5. The function which is used to re-arrange data according to specific


criteria is called:

6. (a) Filtering
(b) Sorting
(c) Organizing
(d) Grouping

7. If we want to change the overall design of a word document, we


should use:

(a) Themes
(b) Page layout
(c) Watermark
(d) Margins

8. To apply the table of contents automatically, the most important task is to


properly define the:

(a) levels of heading


(b) Page numbering
(c) Page layout
(d) Themes

9. The correct formula to calculate the total in the given table is:

A B C D E F G
1 Name English Sindhi/Urdu Maths Science Total
2 Khadim 40 41 41 40
3 Wajid 38 33 37 40
4 Adil 44 45 36 39
5 Asad 38 32 33 45
6

(a) =B2 + C2 + D2 + E2
(b) = SUM (B2 TO E2)
(c) =B2 + E2
(d) =SUM (B2 FROM E2)

10. The correct formula to calculate the percentage in the given table is:

A B C D E F
1 Name English Sindhi/Urdu Maths Science Percentage
2 Khadim 40 41 41 40
3 Wajid 38 33 37 40
4 Adil 44 45 36 39

53
5 Asad 38 32 33 45
6

11. HJHJ
12. GHJHGJ
13. GBHGJK
14. HGVUJH
15.

10. Charts are basically used to:


(a) design tables
(b) organize data in tables
(c) Sort data in different columns
(d) v show the quantities and their relationships graphically
B. Respond the following:
(1) What is a word processor? Write any three applications of a word Processor.
Ans: Word Processor:
Word Processing refers to the act of using a computer to create, edit, save and print
documents. In order to perform word processing, specialized software (known as a
Word Processor) is needed. One example of a Word Processor is Microsoft Word, but
other word processing applications are also widely used. Examples include:
Microsoft Works Word Processor, Open Office Writer, Word Perfect and Google Drive
Document.
Applications of a Word Processor:
A Word Processor allows users to create a wide variety of documents including (but
certainly not limited to) reports, letters, memos, newsletters and brochure. In
addition to typing text, the word processor allows us to add content such as
pictures, tables, and charts to our documents as well as decorative items including
borders and clipart.
The editing and formatting capabilities of the word processor demonstrate the
application's true power. Text can be inserted, edited, moved, copied or deleted
within our document and the appearance of the text can be modified in numerous
ways. Most word processors also give us the ability to check our spelling and
grammar and many have built in dictionaries and other tools to assist us in our
writing,
(2) Discuss the Margins and Paper size options in the Page Setup group.
Ans: Margins (HOTKEY: ALT+P+M):
A margin is the area or space between the main content of a page the page edges.
This button is used to change the margins of the entire document or selected
section.
Size (HOTKEY: ALT+P+S+Z):
The size button is used to choose the size of the paper for current section or entire
document.
(3) Name and describe two options in Orientation.

54
Ans: Orientation (HOTKEY: ALT + P+O):
Page orientation or print orientation is the placement of contents on a page. This
button sets the contents of the page or section in portrait (Vertical) or landscape
(Horizontal) layouts.

(4) How can we apply Margins in a document?


Ans. Apply a Predefined Margin Setting
1. Select Layout Margins.
2. Select the margin measurements you want.
Create a Custom Margin
1. Select Layout Margins.
2. Select Custom Margins.
3. In Margins, use the Up and Down arrows to enter the
values you want.
4. Select OK when done.
Change Default Margins
1. Select Layout Margins Custom Margins.
2. Set your margins.
3. Select Set As Default.
4. Confirm your selection.

(5) Describe the different types of breaks in MS Word.


Ans: Breaks (HOTKEY: ALT + P + B):
Breaks button is used to insert page, section or column breaks in the document.
When we are working on a multi- page document, there may be times when we
want to have more control over how exactly the text flows. Breaks can be helpful in
these cases. There are many types of breaks to choose from depending on what we
need, including page breaks, section breaks, and column breaks.

(6) Differentiate "Bring Forward" and "Send Backward" options in the Arrange group
with example.
Ans: Bring Forward (HOTKEY: ALT + P + A + F):
It brings a selected object in front of all other objects. Send Backward (HOTKEY:
ALT+P+A+E): Send a selected object behind all other objects.
Examples:

55
(7) Explain the "Columns" option in the Page Setup group.
Ans. Column (HOTKEY: ALT+P+J):
This button is used to split the text into two or more vertical columns. As we format
our documents in Word, we may find it better to lay out our text in columns. This is
usually done if we are developing a newsletter or a magazine layout. The number of
columns we use is up to us. To add columns, we follow these steps:
(i) Position the insertion point at the beginning of the material we want to appear in
columns.
(ii) Choose the Page Layout tab on the ribbon.
(iii) In the Page Setup group, click the Columns drop-down list.
(iv) Pick the number of columns we want to use for the selected text.
When we do step (iii) we can select the most common numbers of columns (1, 2, or
3). If you want more columns then these, click the More Columns option in step (iv)
and we will see the Columns dialog box where you can set up to 45 columns.

(8) List and define Position and Wrap Text option in Arrange Group.
Ans: Position (HOTKEY: ALT + P+P+O):
Position is used to place an object (picture or shape) on the page Position wherever
you want.
Wrap Text (HOTKEY: ALT + P+T+W):
Text wrapping is used to arrange the text around an object like an image.
(9) In what way does a ToC help book reader?
Ans: The table of contents serves two purposes:
It gives users an overview of the document's contents and organization.
It allows readers to go directly to a specific section of a document
The table of contents typically includes only major sections of the document,
through in some cases an expanded table of contents that provides a more detailed
view of a complex document may be desirable.

56
A table of contents is particularly useful when a document is divided into multiple
pages. A table of contents provides links to sections of the same document. Those
sections could be located on the same documents easily.
(10) Write steps that will multiply 37 by 15 using the formula bar in MS Excel.
Ans: Multiplying 37 by 15 using the formula bar in MS Excel:
(i) Type 37 in cell A1.
(ii) Then, type 15 in cell B1.
(iii) Then select cell C1.
(iv) In formula bar, type (equal sign).
(v) In formula bar, after type A1 B1
(vi) Press enter.
(vii) The answer (555) will be calculated by M.S Excel and displayed in the selected
cell (C1).
(11) Why do we use Watermark in a document? Give some example of Watermarks.
Ans: Watermark in a document:
A watermark is a faded background image that displays behind the text in a
document. It is simply that image or text that appears mainly behind the main
document. watermarks are normally used to prevent counterfeiting. What water
marking does is to prevent or make it difficult for people to use these documents as
their own. Microsoft Word has some in-built watermarks that can be chosen. For
instance, the in-built watermarks options include draft, confidential and other
functionalities.
For instance, watermark documents will normally display the status of the document
like "confidential", 'Draft" among others. It is important to note that watermarks
can be in form of texts or even images like logo, pictures and other things of value.
Watermark (HOTKEY: ALT + P+P +W):
This button is used to insert logos, images or text behind the contents of adage.
(12) List four uses of spreadsheets in business.
Ans: Common uses of spreadsheets in business are:
(i) storing data
for example: a list of clients, contact information, employee timesheets, sales, and
purchases.
(ii) manipulate and analyze data
(iii) presentation/visualization
(iv) modeling and planning
(v) business accounts and budgeting
(vii) preparing wages
(vi) making invoices
(viii) statistical analysis and reports making.
C. Match the column:

CHAPTER 4 DATA COMMUNICATION & COMPUTER NETWORKS

57
Short & Detailed Questions Answers.

Q 1: Define communication and data communication.


Ans: Communication: Communication is the process of sharing a message. A
conversation between two people is an example of communication. Data
Communication: Data communications refers to the sharing of a virtual message.
Electronic communications, like emails and instant messages and phone calls are
examples of data communications. Data communication is the exchange of digital
messages between two devices. It involves a sender and a receiver which
communicate via some form of transmission medium such as a cable.
Q 2: Define the following terminologies of data communication.
i. Data iv. Data Communication vii. Data Transmission
ii. Analog Signals v. Digital Signals viii. Data Rate/Bit Rate
iii. Baud Rate vi. Signal to Noise Ratio
Ans: Data:
Collection of raw facts and figures is called data. The word data is derived from
Latin language and it is the plural of Datum. The text, numbers, symbols, images,
voice and video which are processed by computers and digital devices are called
data. Data can be considered as unprocessed information. Data

Communication:
Data Communication is the process of transferring data electrically from one place
to another. It is the processor exchange of data and information between two
parties such as human and electronic or computing devices.

Data Transmission:
The data transmission means emission of data in any direction via wireless or wired
medium. Transmission may occur between source and destination.

58
Analog signals:
Analog signals are continuously varying signals or waves that change with
time period and are used to represent data. An analog signal can be used to
measure changes in some physical quantities such as light, sound, pressure
or temperature.

Digital Signals:
A digital signal is an electrical signal that is converted into a pattern of bits
to represent a sequence of discrete values, at any given time. It can only be
one of the finite numbers represented as 0 or 1.

Data Rate/Bit Rate:


Data rate is the rate at which data is transferred. It is normally measured in
bits per second. Bit is the actual binary digit which is the basic unit of data
transmission. It can hold either 0 or 1. Data rate can range from bps (bits
per second) for smaller values to kbps (kilobits per second) and mbps
(megabits per second). It is also called bit rate. Data rate becomes faster
when more bits are transferred in one second.

Baud Rate:
The baud rate is the number of signals transmitted per second and one
signal can represent one or more bits. It is used to describe the maximum
change in an electronic signal. For example, if a signal changes 1200 times
in one second, it would be measured at 1200 baud.

Signal to Noise Ratio:


Signal-to-noise ratio (abbreviated SNR or SIN) is a measure used in
engineering that compares the level of a desired signal and the level of
background noise. It is defined as the ratio of signal power to the noise
power, often expressed in decibels.

60
Q 3: Differentiate between Analog & Digital Signals.
Ans: Difference between Analog & Digital Signals:

Analog Signals Digital Signals


1 Analog signal is a continuous Digital signal is a discrete wave
wave that changes by time that carries information in binary
period. form.
2 Analog signal has no fixed range.
Digital signal has a finite number
i.e. 0 & 1.
3 An analog signal can easily be A digital signal is less prone to
disturbed by other signals or other signals disturbance.
waves.
4 The human voice is an example Signals used by computers are
of an analog signal. digital signals.
5 An analog signal is represented A digital signal is represented by
by a sine wave. square waves.
6 Analog signals are long term Digital signals are short term
waves that need to be boosted. signals remaining with digital
devices/electronics.

Q 4: Differentiate between data rate & baud rate.


Ans: Difference between data rate & baud rate:

Data Rate / Bit Rate Bid Rate


1 Bit rate tells the number of bitsBaud rate is used when we want to
transmitted per unit of time know the number of signal units
(Second). transmitted per unit of time
(Second).
2 Bit rate is the number bits (0's Baud rate is the number of times a
and 1's) transmitted per second. signal is traveling in bits. One
signal can represent more than one
bit.
3 Bit rate = baud rate x the Baud rate = bit rate / the number
number of bits per signal unit of bits per signal unit

Q 5: How can we measure bit rate and baud rate? Give an example of each.
Ans: Both bit rate and baud rate are generally used in data communication.
Bit rate is the transmission of a number of bits per second. On the other
hand, Baud rate is defined as the number of signal units per second. The
formulas which relate both bit rate and baud rate is given below:
Bit rate = Baud rate x the number of bit per baud
Baud rate = Bit rate/the number of bits per signal unit

62
Q 6: Explain components of the communication system using simple
examples.
Ans: Components of a Communication System:
A Communication system has the following five components as shown in the
given figure.

i. Message:
It is the information or data to be communicated. Common forms of
information include text, numbers, pictures, audio and video.
ii. Sender:
It is the device that generates and sends a message. It can be a computer,
telephone handset, etc.
iii. Receiver:
It is any particular digital electronic device which has capability to receive
data in the form of a message. The location of the receiving device is
generally different from the sender. Like a sender, it can also be a computer,
telephone handset, etc.
iv. Medium:
It is the channel or path through which the message is carried from sender
to the receiver. Some examples include twisted-pair cable, coaxial cable,
radio waves, etc.
v. Protocol:
Protocols are the rules and procedures on which computers exchange data
on the network. Sender and receiver follow the same protocols to
communicate with each other. In other words, a protocol is an agreement
between two parties or vendors, using communication devices.

64
Example:
When a person talks with another person directly, then the speaker is the
transmitter conveying the information in the form of sound waves through a
communication channel, the intervening air and listener is the receiver. If
the distance between the speaker and the listener is large, sound waves
cannot reach from the speaker to the listener directly and communication is
not possible. Now to make communication possible we have to change the
communication channel and method.

Q 7: List the properties of a good communication system. Explain to anyone.


Ans: Properties of a Good Communication System:
The effectiveness of a data communications system depends on the
fundamental characteristics which include delivery, accuracy and timeliness.
i. Delivery:
Making sure that the data is delivered is the first fundamental characteristic
of any communication network. The system must be able to deliver data in
the correct order to the correct destination.
ii. Accuracy:
The system must deliver the data accurately. Data that has been altered
during transmission and left uncorrected is not useful.
iii. Timeliness:
The data must be delivered in a timely manner. Late delivered data is
useless.
Q 8: Define transmission medium or Communication Channel. Name its
groups.
Ans: Transmission Medium:
Transmission Medium or Communication Channel is a wireless or physical
path between the sender and receiver through which data is sent and
received from one place to another. Data is transmitted normally by
electromagnetic or electrical signals through different types of wires,
atmosphere or vacuum. Transmission media broadly classified into two
groups; guided and unguided as shown in the given figure

Q 9: Describe guided media and its types.


Ans. Guided Media:
If guided media signals are transmitted in a narrow pathway by using
physical links. It is also called Wired or Bounded transmission media. The
physical links are the cables that are tangible or have physical existence.
There are three common types of guided media used for the networks. Each
of them has its own characteristics like transmission speed, effect of noise,
physical appearance, cost, etc.
i. Twisted Pair Cable:
As the name suggests, this cable is made by two separate wires twisted
together. A twisted pair cable is made up of insulated copper wires. The
insulation and twisting of wires prevent external interference. Each pair of
wires has a unique color code. This type of cable is widely used in different
kinds of data and voice infrastructures. There are two types of twisted pair
cables:
a. Unshielded Twisted Pair (UTP)
b. Shielded
Twisted Pair (STP)

67
a. Unshielded Twisted Pair (UTP):
This type of cable can block interference but it is
vulnerable to external interference. It is mostly used
for telephonic applications. It less expensive
and it is easy to install.

b. Shielded Twisted Pair (STP):


This type of cable consists of a special coating to
block external interference. It is used in fast-
data-
rate Ethernet and also in voice and data
channels
of telephone lines.
ii. Coaxial Cable:
Coaxial cable is also known as coax. It has an outer
plastic covering containing two parallel conductors
each having a separate insulated protection cover.
Cable TVs & analog television networks widely use
coaxial cables.

iii. Fiber-Optic Cable:


In optical fiber or fiber-optic cable data is transferred
in the form of light. It uses the concept of reflection of
light through a core made up of glass or plastic. The
core is surrounded by a less dense glass or plastic
covering called the cladding. It is used for transmission
of large volumes of data at very high speed.

Q10: Describe unguided media and its types.


Ans: Unguided Media:
Unguided media is also termed as wireless or unbounded transmission
media. As the name implies, it does not require a physical medium such as
wire for the transmission of electromagnetic signals. There are three major
types of Unguided Media.
i. Radio Waves:
Radio waves are also called electromagnetic waves. These are easy
to generate and can penetrate through buildings. Radio waves are
omnidirectional and propagated in all directions. It means that
sending and receiving antennas do not need to be aligned. FM, AM
television and cordless phones use radio waves for transmission.

ii. Microwaves:
Microwave transmission is a line of sight transmission i.e. the
sending and receiving antennas need to be properly aligned with
each other. The distance covered by the signal is directly
proportional to the height of the antenna. These are mostly used for
mobile phones are two types of microwave transmissions.
iii. Terrestrial:
Terrestrial microwaves have both stations having antennas on
earth.
iv. Satellite:
In a satellite system some antennas are on satellites in orbit and
others are on stations on earth. They work at remote places so it
can be used in mobile devices.

v. Infrared:
It uses infrared light to transmit Signals. LEDs are used to transmit
signals and light receivers (photodiodes) to receive signals. They
use terahertz frequency. It cannot penetrate walls or other objects.
Infrared light is transmitted generally line on sight (point to point).
Wireless infrared communications can be used to establish short
range wireless links or wireless Local Area Network.

69
70
Q11: What is the difference between radio waves, microwave & infrared
waves?
Ans: Difference between radio wave, microwave & infrared waves:

S.N Basis Radio Wave MicroWave Infrared Wave


o
1 Direction These are Omni- These are These are
directional in unidirectional in unidirectional in
nature. nature nature
2 Penetration At low At low frequency, They cannot
frequency, they they can penetrate
can penetrate penetrate through
through solid through solid any solid object
objects & walls objects & walls. & walls.
but high At high
frequency frequency, they
they bounce off cannot penetrate.
the
obstacle.
3 Frequency Range Frequency Frequency range: Frequency
range: 1 GHz to 300 range:
3KHz to 1GHz. GHz. 300 0Hz to 400
GHz.
4 Security These offers These offers These offers
poor medium security high
security security

5 Attenuation Attenuation is Attenuation is Attenuation is


high variable. low.
6 Government Some Some There is no need
Licensee frequencies frequencies of
in the radio in the government
waves microwaves license to use
require require these waves.
government government
license to use license to use
these. these.

7 Usage Cost Setup and usage Setup and usage Usage Cost is
Cost is Cost is high. very
moderate. less.
8 Communication These are used These are used in These are not
in long distance long distance used in long
communication. communication. distance
communication.

72
Q12: Describe the different types of flaws and faults in transmission signals.
Ans: Transmission Impairments:
Sometimes, signals traveling through transmission media lose their quality.
This means that the received signal is not the same as the signal that was
sent. This phenomenon is called transmission impairments. Transmission
impairments are those defects that occur when data is transmitted. There
are three causes of impairment i.e. attenuation, distortion and noise.

i. Attenuation:
Attenuation means loss of energy. A signal loses its energy due to
the
resistance of medium while it is transmitted. Its strength decreases
with
increase in distance. Amplifiers are used to overcome attenuation
and make
signal stronger again. It is measured in decibels.

Amplifi
ed

ii. Distortion:
Distortion means change in the shape of the signal. A composite
signal has
several frequencies. When it travels through a medium different
component
of signal may reach at different time at destination because each
component
has a different speed in that medium. This is called distortion. They
have
different phases at sender and receiver ends.

iii. Noise:

Unwanted signal that mixes up with the original signal during the
transmission
The data is called noise. It can be induced noise, crosstalk noise,
thermal noise
and Impulse noise which may damage the signal.

73
Q13: Describe the communication devices and their functions.
Ans: Communication Devices:
A communication device is any type of hardware capable of transmitting and
receiving data, instructions and information.

i. Switch:
A switch or network switch is a networking
device
that connects computers and other devices
like
printers, scanners and cameras on a
network. Data
cables from all computers and other devices of
network are plugged into the switch to enable
communication between them.
ii. Router:
A Router is a device that connects two or
more
networks. Routers are a combination of
hardware
and software. The main function of a router is
to
determine the optimal data path and transfer the
information through that path, also known as network
traffic controller.
iii. Modem:
Modem is short for Modulator and Demodulator. Modulation is the
process of
converting digital signals into analog signals. Demodulation is quite
opposite;
it converts analog signals into digital signals. Modem has the ability
of
sending and receiving signals that allows computers to share
information with
each other. This sharing of information is possible over phone lines,

74
cables or
satellite connections.
a. Dial-up Modem:
Dialup modems use standard telephone
lines to
transmit and receive information. A
dialup
modem can be internal or external. It is
important to remember that telephone
lines
carry only analog signals, whereas data
packets
sent by the computer are in digital form. In order
to send these packets across a telephone line,
modem converts digital signals into analog.
b. DSL Modem:
DSL stands for Digital Subscriber Line. Like
dial-up
modem DSL modem also uses telephone
lines to
transfer digital signals. DSL modem has a
built-in
network switch which enables use of
twisted pair
wires to deliver data and voice at high speed as
compared to dial-up modem. Some DSL modems
also have wireless communication functionality.
c. ISDN Modem:
Integrated Services Digital Network is
a digital
phone connection that can transmit
data, voice
and video over a normal telephone line
at the
same time which was not done before.
It is
faster and expensive technology. Since ISDN
work on digital transmission it converts analog
voice to digital signals before transmission.

iv. Network Interface Card (NIC):


Wireless Network
Network cards also known as Interface
Network
Card
Interface Cards (NICs) are hardware devices
that connects a computer with the network.

75

Network
Interface Card
They are installed on the motherboard.
They
are responsible for establishing a physical
connection between the network and the
computer. Computer data is translated
into
electrical signals and sent to the network
via
Network Interface Cards. Modern
motherboards have built-in NICS.

Q14: Define and explain computer networks.


Ans: Computer Networks:
Computer networks are just like a highway on which data can
travel. A computer
network connects parts of distributed systems including hardware
and software. It
shares common functions and features like data and devices which
is very
important nowadays.
A computer network is a group of computers and related equipment
connected by
a-communication links to share data and other resources. The
related equipment
may be printers, scanners, fax machines, servers, etc. The
resources may include a
file server, internet connection, etc.

Q.15: Define computer networking.


Ans. Networking:
Networking is the act of joining computers and its accessories so
that exchange of
information and sharing of resources take place. In today's world,
networking plays
a vital role in computers and telecommunication fields. Modem
organizations create
a networking environment and device connectivity for fast,
inexpensive and reliable
communication.

76
Q16: Describe the types of computer networks.
Ans. Types of Computer Networks:
Computer networks can be categorized by their size as well as their purpose.
The size of a network can be expressed by the geographical area they
occupy and the number of computers that are part of the network. Networks
can cover anything from a handful of devices within a single room to millions
of devices spread across the entire globe. There are three types of computer
network:
i. Local Area Network (LAN)
ii. Wide Area Network (VVAN)
iii. Local Area network (LAN):
iv. Metropolitan Area Network (MAN)

i. Local Area Network (LAN):


LAN is a group of computer and peripheral devices which are
connected in a limited area such as school, laboratory, home and
office building. Useful resources like internet access, storage space
and printers can be shared through LAN. It can be built with
inexpensive hardware such as hubs, switches, network adapters
and network cables. Data and software are also shared through
LAN.
Examples: Some examples of LAN are:
• Networking between two computers.
• Networking in the home, school, library, laboratory, college/
university
campus, or office.
• Wi-Fi which is also known as wireless LAN.

ii. Metropolitan Area Network (MAN):


In MAN, computer networks can spread across an entire city,
college campus, or a small region. It can cover the area of several
miles and may include multiple small networks or LANS. MANS offer
very fast communication but they are expensive to establish.
Therefore, only large business organizations or universities set up
MAN. It also requires security measures to prevent unauthorized
access.
Examples: Some examples of MAN are:
• Cable TV network
• Telephone networks providing high-speed DSL lines

77
• IEEE 802.16 or WiMAX, that provides high-speed broadband
access with
Internet connectivity to customer premises.

iii. Wide Area Network (WAN):


A wide Area Network is used for long distance transmission of data.
WAN helps to cover a larger geographical area and connect cities,
provinces or even countries.
Using WAN technology, computers may be linked together in
different countries using satellites, microwaves or
telecommunication links. Therefore, large business, research and
educational organizations situated at longer distances use WAN. A
WAN may include multiple MANs and LANS. WANS are set up with
expensive devices and need some dedicated connections.
Example: Internet is the example of WAN.

Q7: Define topology. What does the topology of a network describe?


Ans: Topology:
The physical layout in which computers are connected is called topology.
The topology of a network describes the way computers are connected.
Topology is a major design consideration for computer networking.
Q18: Describe merits and demerits of different topologies of the network.
Ans: Bus Topology:
As the name suggests, in Bus Topology computers and other devices are
connected with a single cable. The central cable is the backbone of the
network and every device communicates with the other device through
this bus. The advantages of Bus Topology are simplicity, low cost and
easy expansion of the network. The disadvantage of the Bus Topology is
that a breakdown in the bus cable brings the entire network down.

78
Ring Topology:
In Ring Topology, computers are connected in a ring or circle shape. The
signal travels around the loop in one direction and passes through each
computer. The recipient of the message receives the message while
another computer acts like a repeater to send it to the next computer.
The failure of a link or a computer can make the entire network non-
functional.

Star Topology:
In a star topology, all the computers are connected to a central device
called hub or switch. To communicate with any computer, the sender
must send information to the hub. Then the hub transmits that
information to the destination. The advantages of star topology are easy
to set up and easy expansion of the network. Another feature of Star

79
topology is that if one link to the hub breaks, only the station using that
link is affected, not the whole network. It requires more cable length than
a bus topology. If the connecting network device (network switch) fails,
nodes attached are disabled and cannot participate in computer network
communication.

Q19: Define standards and network standards. Explain the purpose of the
Standard Organization.
Ans: Standards:
Standards are rules that define the appearance, functionality, or protocols
of some equipment.
Network Standards:
They are essential for network communication. Network standards define
rules of
communications among computing devices. This ensures that companies
(i.e.
Cisco and IBM) that manufacture computing and networking products
follow these
uniform standards. By following standards, all hardware becomes
compatible in the
network, allowing efficient networking to take place.
Standard Organization:
Standard Organization develops, coordinates, revises, amends and
reissues
technical standards. These standards are intended to address the
requirements of
a group of concerned devices. There are several organizations working on
standardization of computing equipment to enable the interoperability
among

80
different devices manufactured by different companies in different
regions. IEEE,
IETF, ITU and ANSI are the examples of standard organizations.
Q20: Write a few lines about different standard organizations.
Ans:
i. International Organization for Standardization (ISO):
It covers a wide range of fields. The ISO has members from the
standards
committees of various governments across the world. It is even
responsible
for developing models which provide high level of system
compatibility,
quality enhancement, improved productivity and reduction in costs.
The ISO
is also responsible for endorsing and coordinating the functions of
the other
standards organizations.
ii. Institute of Electrical and Electronic Engineering (IEEE):
It is an international professional non-profit organization.
Electronics,
computer and communication engineers, researchers, scientists and
students
are the members of IEEE. This organization develops
communication and
information processing standards for all field related to electrically
computer
engineering.
iii. International Engineering Task Force (IETF):
It is a large international community of network designers,
operators, vendors
and researchers concerned with the development of internet
architecture and
smooth operation of the internet.
iv. International Telecommunication Union (ITU):
This organization is a specialized agency that is responsible for
resolving the
issues that concern information and communication technologies.
v. American National Standards Institute (ANSI):
It is the official standards agency for the United States. ANSI is a
completely

81
private, non-profit organization comprised of equipment
manufacturers and
users of data processing equipment and services. It supervises
standards for
products, services, processes, systems and personnel in the United
States.
ANSI membership is comprised of people from professional
societies,
industry associations, governmental and regulatory bodies, and
consumer
goods.
Q21: What is network architecture?
Ans: Network Architecture:
It is the design of a computer network. It is a framework for the
specification of a
network's physical components, their functional organization and
configuration,
operational procedures and communication protocols used. Just like OSI /
TCP
layered architecture.
Q22: Why is the OSI model broken up into layers?
Ans: The OSI model is conceptual. It is broken up into layers so a person
can visualize
network communications from the application to the medium. It works
going up the
stack at the destination as well. Rather than just "all the magic happens",
it is
broken down so you can visualize the steps a computer takes when it
encapsulates
data.
Breaking things down into layers also allows for better troubleshooting. If
there is
no data being received on my NIC, then we can assume it is a layer 1 or
2 problem.
If we are getting routing errors, then we most likely have a layer 3
problem. It allows
an administrator to better pinpoint an issue.

82
Q23: Describe ISO's OSI Model.
Ans: ISO's OSI Model:
The Open Systems Interconnection model is a conceptual model
developed by ISO. It characterizes and standardizes the communication
function of a telecommunication and computing network. Its goal is the
interoperability of different communication systems with standard
communication protocols. This model divides a communication system
into seven abstraction layers.

S.N Layers Functions


o
1 physical It is responsible for converting
electrical signals into bits. It also
defines the cable types to be
used as transmission media,
cards, topology and other
physical aspects.
2 Data link This layer is responsible for
transmitting data using physical
addresses. Data Link Layer
ensures error free transmission
of packets. Packet in this layer is
referred to as Frame.
3 Network The function of this layer is the
selection of the shortest and
suitable path from source to
destination, from the number of
routes available. It is also
responsible for converting logical

83
addresses (IP addresses) to
physical addresses (MAC
addresses).
4 Transport It ensures the reliable
transmission of data. Transport
layer manages error control, flow
control and quality of the
service. If the data is not
properly transmitted it requests
to resend.

5 Session This layer establishes, maintains


and ends a session or logical
connection between applications
on two computers. It manages
who can transmit data at a
certain time and for how long.
This layer adds checkpoints. If a
session fails, only data after the
most recent checkpoint needs to
be transmitted.
6 Presentation It receives information from the
application layer & converts it to
uniform network format (ASCII
or Unicode) which is acceptable
by the rest of the OSI model and
destination. Encryption and
decryption are also the
responsibility of this layer. This
layer also reduces the number of
transfer bits by compression.

7 Application Applications such as email, File


transfer, etc. These applications
produce the data, which is
transferred over the network.
It receives information from the
application layer and converts it
to uniform network format
(ASCII or Unicode) which is
transferred over the network.

84
Q24: Describe TCP/IP Model.
Ans: TCP/IP Model:
practicalcentre.blogspot.com
TCP/IP is a suite of communication protocols used to interconnect network
devices
on the internet. These are a set of rules and procedures. TCP/IP specifies
how data is
exchanged over the internet by providing end-to-end communications. It
also
identifies how data should be broken into packets, addressed, transmitted,
routed
and received it at the destination. With reference to OSI layers, we can
understand
the functions of TCP/IP layers.

OSI Layers TCP/IP Functions


Layers
Application Application Using protocols like HTTP and FTP, this
Presentation Layer layer allows interaction with applications.
Session Application layer is also responsible to
encode and decode data and establish
communication between two devices.
Transport Transport Using protocols like UDP and TCP, this layer
Layer establishes a logical connection between
two devices and ensures the reliable
delivery of data.
Network Internet It is responsible for packet forwarding by
Layer accessing physical paths.
Data Link Network Using the logical addressing this layer
physical Access Layer decides how data will be sent across
different networks paths.

Q25: What is a network address?


Ans: Network Address:
Network addresses are like our house addresses. They must be unique and
distinctive. This avoids confusion for the postman. A network address is any
Logical or Physical Address that uniquely identifies it from others. This
address is needed to distinguish a network node or device on a computer
network. It is a numeric or symbolic number or address that is assigned to
any device that seeks access to a network or is part of a network. We have
to remember, Physical and Logical Addresses are different.

85
Q26: Differentiate between Physical and Logical Addresses.
Ans: Difference between Physical Address and Logical Address:

S.N Physical Addresses Logical Addresses


o
1 Physical address is attached Logical address is assigned to a
with the ROM of the NIC card. device.
2 Physical Addressing means MAC Logical addressing means IP
addressing that is provided by your
(Media Access Control) Internet Service Provider (ISP) or
provided by set by a network administrator.
manufacture and attached
address of
the NIC. The card which is used
to
connect your machine to the
internet.
3 Physical addressing cannot be Logical Address can be changed
changed. They are also called
hardware addresses.
4 Physical address is a 48 bit mac Logical address is a 32 bit IP
address Address.
5 It is globally Unique and It is unique in one network and
permanent. temporary.

Q27: Define and explain IPV4 Address.


Ans. IPV4 Address:
An IP address is a unique number or address used to identify a device on a
network. The device could be a computer, printer, smart phone, tablet, etc.
Every device connected to the internet must have an IP address to
communicate
with other devices. IP address acts as a telephone number or a car
registration
number. It shows ownership and location. IP address allows a device to
communicate and be located by other devices on the internet. IPV4 stands
for
Internet Protocol version 4.
An IPV4 address is made up of 32 binary bits, which is divided into two
parts,
network and host. The network portion of the address mentions the
computer
network and the host portion identifies the computer or any other computing

86
device.
IP version 4 (IPV4) addresses are comprised of four number segments
separated
by dots. Example of an IP address is 192.168.108.105.

87
DATA COMMUNICATION & COMPUTER NETWORKS CHAPTER# 04

A. Choose the Correct Answers:


1. Wired Media is also called:
(a) Targeted Media
(b) Directed Media
(c) Guided Media ✔
(d) Unaided Media
2. Communication system is made up of:
(a) Three Components
(b) Four Components
(c) Five Components ✔
(d) Six Components
3. Both Physical and Logical addresses are:
(a) Different
(b) Unique ✔
(c) Permanent
(d) Temporary
4. If you are an electrical or electronic engineer, you should join:
(a) IEEE ✔
(b) IETF
(c) ITU
(d) ANSI
5. The topology in which all computers are connected to a central device
called hub is:
(a) Bus
(b) Star ✔
(c) Ring
(d) Tree
6. Change in the shape of signal between sender and receiver is called:
(a) Attenuation
(b) Interruption
(c) Noise
(d) Distortion ✔
7. Router determines data path to transfer data packets which is the:
(a) Shortest
(b) Longest

88
(c) Cheapest
(d) Optimal ✔
8. Converting digital signal to analog called:
(a) Modulation ✔
(b) Modification
(c) Bandwidth
(d) Multiplexing
9. The number of bits used in an IPV 4 address are:
(a) 16
(b) 32 ✔
(c) 64
(d) 128
10. The loss of energy in transmission signal refers to:
(a) Attenuation ✔
(b) Distortion
(c) Noise
(d) Jitter

89
B. Respond the Following:
i. List the properties of a good communication system. Explain any
one.
Ans: Properties of a Good Communication System:
The effectiveness of a data communications system depends on the
fundamental characteristics which include delivery, accuracy and
timeliness.
i. Delivery:
Making sure that the data is delivered is the first fundamental
characteristic of any communication network. The system must be
able to deliver data in the correct order to the correct destination.
ii. Accuracy:
The system must deliver the data accurately. Data that has been
altered during transmission and left uncorrected is not useful.
iii. Timeliness:
The data must be delivered in a timely manner. Late delivered data
is useless.
ii. Explain components of communication using a single example.
Ans: Components of a Communication System:
A Communication system has the following five components as
shown in the given figure.

i. Message:
It is the information or data to be communicated. Common
forms of information include text, numbers, pictures, audio
and video.
ii. Sender:
It is the device that generates and sends a message. It
can be a computer, telephone handset, etc.
iii. Receiver:
It is any particular digital electronic device which has
capability to receive data in the form of a message. The

90
location of the receiving computer is generally different
from the sending computer. Like sender, it can also be a
computer, telephone handset, etc.
iv. Medium:
It is the channel or path through which the message is
carried from sender to
the receiver. Some examples include twisted-pair cable,
coaxial cable, radio waves, etc.
v. Protocol:
Protocols are the rules and procedures on which computers
exchange data on the network. Sender and receiver follow
the same protocols to communicate with each other. In
other words, a protocol is an agreement between two
parties or vendors, using communication devices.
Example:
When a person talks with another person directly, then the
speaker is the
transmitter conveying the information in the form of sound
waves through a communication channel, the intervening
air and listener is the receiver. If the distance between the
speaker and the listener is large, sound waves cannot
reach from the speaker to the listener directly and
communication is not possible. Now to make
communication possible we have to change the
communication channel and method.

iii. Write the function of the following network devices.


Amplifiers, Routers, Switch, Hub.
Ans. Amplifiers:
Amplifiers are used to overcome attenuation and make signals
stronger again.
Routers & Switch:
A switch or network switch is a networking device that connects
computers and other devices like printers, scanners and cameras
on a network. Data cables from all computers and other devices
of the network are plugged into the switch to enable
communication between them.
Router is a device that connects two or more networks. Routers
are a combination of hardware and software. The main function
of a router is to determine the optimal data path and transfer

91
the information through that path, also known as network traffic
controller.
Hub:
In a star topology, all the computers are connected to a central
device called hub or switch. To communicate with any computer,
the sender must send information to the hub. Then the hub
transmits that information to the destination.

iv. List the causes of signal impairments. Explain any one.


Ans: Transmission Impairments:
Sometimes, signals traveling through transmission media lose their
quality. This
means that the received signal is not the same as the signal that
was sent. This
The phenomenon is called transmission impairments. Transmission
impairments are those defects that occur when data is transmitted.
There are three causes of impairment.
i. Attenuation
ii. Distortion
iii. Noise.
i. Attenuation:
Attenuation means loss of energy. A signal loses its energy
due to the resistance of the medium while it is transmitted.
Its strength decreases with increase in distance. Amplifiers
are used to overcome attenuation and make signals
stronger again. It is measured in decibels.

Amplifi
ed

v. What is the difference between radio waves & microwave waves?


Ans: Difference between radio wave & microwave waves:

S.N Basis Radio Wave MicroWave


o
1 Direction These are Omni- These are
directional in unidirectional in
nature. nature

92
2 Penetration At low frequency, At low frequency,
they can penetrate they can penetrate
through solid through solid objects
objects & walls & walls. At high
but high frequency frequency, they
they bounce off cannot penetrate.
the
obstacle.
3 Frequency Frequency range: Frequency range:
Range 3KHz to 1GHz. 1 GHz to 300 GHz.

4 Security These offers poor These offers


security medium security

5 Attenuation Attenuation is high Attenuation is


variable.
6 Government Some frequencies Some frequencies
Licensee in the radio waves in the microwaves
require require government
government license to use these.
license to use
these.
7 Usage Cost Setup and usage Setup and usage
Cost is moderate. Cost is high.
8 Communicat These are used in These are used in
ion long distance long distance
communication. communication.

vi. Why is the OSI model broken up into layers?


Ans: OSI Model is broken up in layers:
The OSI model is conceptual. It is broken up into layers so a person
can visualize
network communication from the application to the medium. It
works going up the
stack at the destination as well. Rather than just "all the magic
happens", it is
broken down so we can visualize the steps a computer takes when
it encapsulates
data.
Breaking things down into layers also allows for better
troubleshooting. If there is
no data being received on our NIC, then we can assume it is a layer

93
1 or 2 problem.
If we are getting routing errors, then we most likely have a layer 3
problem. It allows
an administrator to better pinpoint an issue.
vii. Explain the purpose of the Standard Organization.
Ans: Standard Organization develops, coordinates, revises, amends
and reissues
technical standards. These standards are intended to address the
requirements of
a group of concerned devices.
There are several organizations working on standardization of
computing
equipment to enable the interoperability among different devices
manufactured by
different companies in different regions.
Example: ISO, IEEE, IETF, ITU and ANSI are the examples of
standard
organizations.
viii. List one merit and one demerit of each topology.
Ans:
i. BUS TOPOLOGY:
Advantage or Merit of Bus Topology:
• Simplicity
• Cable required is least compared to other network topology.
• Used in small networks.
• It is cost effective i.e. low cost.
• It is easy to understand.
• Easy expansion of the network i.e. easy to expand joining
two cables
together.
Disadvantage or Demerit of Bus Topology:
• A breakdown in the bus cable brings the entire network
down.
• If network traffic is heavy or nodes are more the
performance of the
network decreases.
• Cable has a limited length.
• It is slower than the ring topology.
ii. RING TOPOLOGY:
Advantage or Merit of Ring Topology:
• Transmitting network is not affected by high traffic or by

94
adding more
nodes, as only the nodes having tokens can transmit data.
• Cheap to install and expand.
Disadvantage or Demerit of Ring Topology:
• The failure of a link or a computer can make the entire
network
nonfunctional.
• Troubleshooting is difficult in ring topology.
• Adding or deleting the computers disturbs the network
activity.
iii. STAR TOPOLOGY:
Advantage or Merit of Star Topology:
• The advantages of star topology are easy to set up and easy
expansion of
the network.
• Another feature of Star Topology is that if one link to the
hub breaks, only
The station using that link is affected, not the whole network.
• Fast performance with few nodes and low network traffic.
• Hubs can be upgraded easily.
• Easy to troubleshoot.
Disadvantages or Demerits of Star Topology:
• Cost of installation is high.
• Expensive to use.
• If the hub fails then the whole network is stopped because
all the nodes
depend on the hub.
• Performance is based on the hub, that is, it depends on its
capacity.

(Note: Write down only one merit and one demerit for each
topology as asked in
question)

ix. Give one example of LAN, WAN and MAN.


Ans. Example of Local Area Network (LAN):
• Networking between two computers.
• Wi-Fi which is also known as wireless LAN.
Example of Metropolitan Area Network (MAN):
• Cable TV network

95
• Telephone networks providing high speed DSL lines.
Example of Wide Area Network (WAN):
• The Internet is an example of WAN.
x. How can we measure bit rate and baud rate? Give an example of
each.
Ans. Both bit rate and baud rate are generally used in data
communication.
Bit rate: is the transmission of number of bits per unit of time
(second). Bit rate can
be ranging from bps (bits per second) for smaller values to kbps
(kilobits per
second) and mbps (megabits per second).
For Example:
DSL connection may be able to download data at 10 kbps, means
10,000 bits are
transferred within one second.
Baud rate: is defined as the number of signal units transmitted per
unit of time
(second).
For Example:
If a signal changes 1200 times in one second, it would be measured
at 1200 baud.
Formula:
We can measure bit rate and baud rate by the following formula,
which relate both:

Bit rate = baud rate x the number of bits per


signal unit
OR
Baud rate = bit rate / the number of bits per signal
unit

Example:
When Bit rate and Baud rate are Same:
Assume 9600 bits are transferred per second and 1 bit used to
represent signal
level i.e either logic 0 or logic 1 then bit rate is 9600 because
number of bits
transferred per second are 9600 and baud rate is 9600 because
number of
changes happening per seconds are also the same.

96
When Bit rate and Baud rate are not same:
If 9600 bits are transferred per second and 2 bits used to represent
the signal level
then bit rate is 9600 because the number of bits transferred per
second are 9600
but baud rate is 4800 because two bits represent signal level.

S.N A S.N B C
o o

1 Parts of an IPV4 a WAN i-b


address

2 Physical address b Network & Host ii-e C. Match the


Columns:
3 Change in shape of c Transport iii-f
signals Layer

4 A networking d Data Link Layer iv-a


connecting two
continents

5 TCP & UDP are used e Cannot be v-c


changed

6 In OSI model layer f Distortion vi-d


responsible to decide
the format of data

CHAPTER 5 Computer Security & Ethics CHAPTER# 05

Short & Detailed Questions Answers.


Q1: What do you know about computer security?
Ans: Computer Security:

97
"Computer security is the protection against theft o r damage to our
computer
hardware, software and information present on them from threat of viruses
or
unauthorized use."
Explanation:
The computer has become an important part of our life. We store important
data on
our computers in the shape of documents, pictures, programs, etc.
Therefore, we
expect that all our information must remain safe and our computer runs
properly
without any problem.
Few threats can cause problems for our computers. These threats may be
different
types of viruses or unauthorized use of a computer. To prevent our
computer from
such threats, we need to abide by computer security.
Q2: Why is computer security important? Write any three reasons.
Ans: Importance of Computer Security:
i. Prevent from viruses and malware:
• Computer security is important for our computer's overall health.
• It keeps our information protected and helps prevent viruses and
malware,
which allows programs to run quicker and smoother.
ii. Secure Private Information:
• It safeguards confidential and sensitive information.
• The advancement in science and technology has changed day to
day
activities. We rely on computers and mobile phones, where we
access a
a lot of information which we do not want to share with others. This
information may include our passwords, banking details, contacts,
pictures, etc. To protect this information we need to make our
devices
secured that no one can damage or access this information without
our
consent.
iii. Provide Safe Environment:
• Computer Security is important as it enables people to perform

98
their work
in safe environments.
• It helps in the execution of essential business processes.

Q3: Explain Cyber Bullying with an example.


Ans: Cyber Bullying or Harassment:
Cyber bullying or harassment is a type of cyber-crime in which electronic
means like a computer, mobile phone or internet are used for online
bullying or harassment.
Example:
Harmful bullying behavior can include:
• Posting rumors
• Threats
• Passing inappropriate remarks
• leaking personal information
• Blackmailing and
• Committing hate speech
Effect of Cyber Bullying or Harassment On Victim:
• The perpetrator does it with the intent to cause harm to the victim.
• Victims may experience lower self-esteem, intent to commit suicide and
a variety of negative emotional responses, including being scared,
frustrated, angry and depressed.
Q4: Write a short note on cybercrime.
Ans: Cybercrime:
As communication, trade, and services are relying more on computers
and networks. Cybercrimes are growing too. Cybercrime is the crime that
is committed through a computer and network. Cybercriminals use
devices to gain unauthorized access to important information. Stealing
passwords and important information, hacking social media accounts,
accessing any individual bank account and making transactions,
committing online frauds are some of the examples of cybercrime.
Cybercrime is illegal and also punishable. According to Pakistan's
Cybercrime Law, any offender who interrupts the privacy of a person or
organization and harms their repute may be sent to jail for three to five
years including a heavy fine.

99
Q5: Define malware? And describe different types of malware?
Ans: Malware:
The term malware is the contraction of malicious software.
● Malware is a broad term that encompasses computer viruses,
worms, spyware, adware and others.
● Malware is a program that is written generally to cause a mess.
They can be so
dangerous that they can also damage devices.
● However commonly malware encrypt, steal or delete data, hijack
core functions
of computing and disturbing different activities.

Q6: Who is a hacker?


Ans: Hackers:
Hacker can be a person who has in-depth knowledge of computer
systems,
networks and programs. A hacker is someone who uses his or her
extensive skills
to identify and overcome a network loophole. Hackers constantly seek
further
knowledge and freely share what they have discovered. Hackers are
generally
considered as bad people however, hackers can also help us to improve
the data
and network security Government and business organizations are now
hiring
ethical hackers, also known as white hat hackers, to prevent data theft.
Q7: What is ethical hacking?
Ans: Ethical Hacking:
Ethical Hacking sometimes called as Penetration Testing is an act of
intruding /
penetrating into system or networks to find out threats, vulnerabilities in
those
systems which a malicious attacker may find and exploit causing loss of
data,
financial loss or other major damages. The purpose of ethical hacking is
to improve
the security of the network or systems by fixing the vulnerabilities found
during
testing. Ethical hackers may use the same methods and tools used by the

100
malicious
hackers but with the permission of the authorized person for the purpose
of
improving the security and defending the systems from attacks by
malicious users.
Ethical hackers are expected to report all the vulnerabilities and weakness
found
during the process to the management.
Q8: Who is a cracker?
Ans: Crackers:
Crackers are persons who gain unauthorized access to another system. They
bypass passwords or licenses of computer programs, change source code or
intentionally breach computer security. They do it with negative intentions.
Crackers can also make targeted systems unavailable or non-functional.
They commit these activities generally for money but they may do it for
fame or just for challenge or fun.

Q9: Describe computer crime in real life.


Ans: Computer Crime in Real Life:
As technology is growing, data security has become crucial. We can be a
victim of computer crime at any time. Computer crime can range from an
international data security threat to a personal offense. In 2013, hackers
managed to hack 1 billion email accounts of the users. Likewise, in 2017, the
Wanna Cry virus attacked the National Health Service in the United Kingdom
which made the whole system non-functional for several days. As far as
personal offenses are concerned, hacking the social media and mail accounts
are so common. There are many genres of computer crime or now called
cyber-crimes. Some examples of such crime in real life are discussed here.

i. Hacking:
Hacking is perhaps the most common crime in the computer world.
Hackers can steal our WiFi, email or social media accounts
passwords. Hackers also attack a website and take it down.
However, the scope of hacking is much wider. The hackers can also
steal sensitive information from government and business
organizations, make fraudulent transactions and erase data on the
network computers.
ii. Credit and Debit Card Scam:
Keeping debit or credit cards is a common practice but insecure use
of these cards can be dangerous. If a person has information about
our debit or credit card he or she can make fraudulent transactions.
There are various ways to get this information. One way is through

101
scamming. Scammers set small machines inside an ATM or credit
card machine. These machines copy the data which is then misused
by the scammers. Debit and credit cards are also secured with PIN
codes.
iii. Phishing:
Phishing is a method of trying to gather personal information using
false e- mails and websites. In phishing, perpetrators contact the
target person through email, telephone or text message and pose
as a legitimate and trusted individual. He or she asks the target to
provide sensitive data such as personally identifiable information,
banking and credit card details and passwords for different reasons.
The information is then used to access different accounts and can
result in identity theft and financial loss.
iv. Clickjacking:
If we see a video tagged as "OMG? You won't believe what this boy
has done!" or we find a button on a website that asks us to click to
claim a reward we had never applied for? This is a kind of fraud
which is called Clickjacking. Usually, culprits target children or
novice internet users to click on a link containing malware or trick
them into sharing private information via social media sites.
v. Cyber Bullying or Harassment:
Electronic means computer, mobile phone or internet are also used
for online bullying or harassment. Harmful bullying behavior can
include posting rumors, threats, passing inappropriate remarks,
lending personal information, blackmailing and committing hate
speech. The perpetrator does it to cause harm to the victim. Victims
may experience lower self-esteem, intent to commit suicide and a
variety of negative emotional responses, including being scared,
frustrated, angry and depressed.

Q10: Your friend has become a victim of cyber harassment. What two
pieces of advice would you give him or her?
Ans: Pakistan is in the list of the fastest-growing countries that are using
the internet. This opens the doors for the fact that cyber bullying is
increasing as well but yet there is no legislation for cybercrimes in
Pakistan. If my friend becomes the victim of cyber harassment, I will give
him advice that:

1. Write down an application (in English or in Urdu), describe the


complete problem, provide as much evidence, details as he/she can and
send it to the FIA National Response Center for Cyber Crimes.
2. The Citizens-Police Liaison Committee (CPLC) has set up a women
complaint cell aimed at dealing with women harassment issues across the

102
country. Complaints can be made on these numbers: 021-35662222,
021-35682222.
Q11: What is cyber-attack?
Ans: Cyber Attack:
Cyber-attack occurs when a cyber-criminal uses a computer or any device
to launch attacks to other single or multiple computer networks. The
culprit tries to enter a computer system and network through cracking,
scam links, phishing or any other method. Generally cyber-attacks are
committed for getting any benefit or causing harm to the victim 's
computer, network or websites. A cyber-attack either disables the
targeted computer, deletes information or knocks it offline. It may also
steal information from the computer or network.
Q12: Give two examples of phishing.
Ans: Example 1:
There are targeted and simple forms of phishing emails designed to get
victims to purchase cards, or to give up personal email or phone
numbers. The "email compromise" gets its name because the attacker
mimics the email of a known sender. However, these can also be sent
through a legitimate, albeit hacked account. The messages start out as
basic greetings then progress into requests for money or data. Since the
content is highly personalized it's often easy to get hooked.
Example 2:
There are targeted and simple forms of phishing emails designed to get
victims to interact and establish a rapport. The messages start out as
basic greetings or job opportunities and then progress into requests for
money or data.
Q13: What will you do in case of becoming a victim of computer cyber-
crime?
Ans: The perpetrator of cyber-crime always asks to keep his or her
contact secret
otherwise the victim may face heavy loss. The response of the victim of
cyber-
crime, bullying or harassment is very crucial. There are ways to get rid of
such
miseries. First thing is to report such incidents to the trusted people that
are highly
likely parents and teachers.
The government has also taken measures to curb cyber crimes especially
cyber
bullying and harassment. In Pakistan, the National Response Centre for
Cyber
Crimes has been set up to help the victims of cybercrimes. An online
complaint can

103
be launched through the form available on the website or help may be
sought by
calling helpline 9911 which is available 24/7.
Q14: Define malware.
Ans: Malware:
The term malware is the contraction of malicious software. Malware is a
broad term
that encompasses computer viruses, worms, spyware, awareness and
others. Malware
is a program that is written generally to cause a mess. They can be so
dangerous
that they can also damage devices. However commonly malware encrypt,
steal or
delete data, hijack core functions of computing and disturb different
activities.
Q15: Describe the different types of malware.
Ans: Different Malware:
Types of malware can include computer viruses, worms, adware and
spyware.
i. Computer Virus:
A computer virus is a computer program that can spread across
computers
and networks by making copies of itself, usually without the user's
knowledge.
It can also modify other computer programs, insert its own code
and change
computer settings. Viruses are harmful. They can range from
displaying
irritating messages to make the documents inaccessible or even
delete them.
Viruses generally latch on a host file and when they execute they
infect other
files or programs. Boot Sector, Resident, Macro Viruses and File
Infector are
some examples of viruses.
ii. Worm:
A computer worm spreads copies of itself from computer to
computer. A
a worm can replicate itself without any human interaction. It does
not need to
attach itself to a file or program to cause damage. It can do several
malicious

104
tasks, such as dropping other malware copying itself onto devices
physical
attached to the affected system, deleting files and consuming
internal storage
and memory resources.
iii. Adware:
Adware is advertising-supported software. They present endless ads
and
pop-up windows that could potentially consume memory and
processing
resources. Adware can also change the different settings of internet
browsers
like the homepage and default search engine. Normally, these are
not as
dangerous as other malware.
However, Adware annoys the user and slows down the processing.
The
advertisements produced by adware are sometimes in the form of a
pop-up
or sometimes in little windows that may not be closed. Adware
programs
include games, desktop toolbars or utilities. Commonly, adware is
web-based
and collects web browser data to target advertisements, especially
pop-ups.
iv. Spyware:
Spyware is a malware that monitors a-device and steals important
information
about a person or organization without their consent and sends
such
information to another person or organization. Spyware takes
control over a
mobile phone or computer without the user's knowledge. They
capture
information like web browsing history, email messages, usernames
and
passwords and online payment information. Spyware can come
through
cookies or even when we install software without readings its terms
and
conditions. System monitors, cookies trackers, rootkits and key-
loggers are
a few examples of Spyware.

105
Q16: Describe the ways viruses spread.
Ans: Ways of Viruses Spread:
A computer virus is just like a flu virus. It is designed to spread from one
device to
another device and can replicate itself. Any device that is infected from a
virus can
infect other devices. It means that viruses come from outside. Here are
some ways
how they come:
i. USB Flash Disk and CDs:
USB Flash Disks are the most common media to transfer files.
An infected computer can spread a virus to a clean USB flash
disk that is inserted and likewise, an infected USB can
transmit the virus onto a clean computer. The Auto Run
function in Windows launches installers and other programs
automatically when a flash drive or CD is inserted. This action
can initiate a virus spreading process onto the computer.
Copying infected files from the USB or CD can also infect the
computer.
ii. Internet Downloads:
Computer viruses also spread through files or software
downloads from the Internet. They can be attached to
software or files that we download. The viruses that come
from the internet can also make computers accessible to
hackers. Though, almost every antivirus software provides a
shield against malicious downloads, it is highly recommended
that the software and files must be downloaded from trusted
sources.
iii. Computer Network:
Users must be careful because files picked from a Local Area
Network (LAN) may be infected and cause damage to our
computer or operating system. Some can happen to transfer
files from one mobile device to another Email attachments
have been a popular medium to spread viruses. Viruses can
easily be transferred from one computer to another through
email attachments. The infected email may come from an
unknown or fake email address. Perpetrators who spread
these viruses use either fake email or change a few letters in
a trusted email address. People in our contact list may also
send us infected files as they may not be aware of it
themselves. Users must check the origin of the email before
opening the attached files or clicking any link that is given in

106
the email. Especially spam mails must be checked carefully
before clicking on its attachment.

Q17: Define antivirus software. Describe some antivirus software.


Ans: Antivirus:
Antivirus are utility software designed to protect computers from
any potential threats of data or hardware loss. It is highly
recommended that the user must install an antivirus on an
operating system like Windows. Antivirus software works in the
background and monitors every software that is running and the
emails or data coming from the internet. In case of any suspicious
activity, antivirus alerts the user and asks for action. Normally,
antivirus tries to clean the files and if not succeeded it quantities
the infected file. This is highly recommended that the user should
update the antivirus regularly. Many antivirus software can be
found on the internet and most of them are generally free.
However, in the free version of antivirus, some advanced features
are not available. Paid customers are called premier users and they
get advanced security features.
i. Avast:
Avast is one of the largest security companies in the world,
Avast's management claims that they are using next-gen
technologies to fight cyber- attacks in real time. They also
claim that Avast has an immense cloud-based machine
learning engine that receives a constant stream of data from
hundreds of millions of users. This facilitates learning at
extraordinary speeds and makes artificial intelligent engines
smarter and faster to stop viruses.
ii. Norton:
Norton Antivirus has been a popular antivirus utility since
1991. This is a part of a large family of security and other
utility software by Symantec Corporation. Norton Antivirus is
easy to use, has the configuration that experts need, comes
highly rated by the testing labs and is exactly designed to
have the least possible impact on our system performance.
iii. McAfee:
McAfee claims that it provides a combination of antivirus,
privacy and identity tools and features. This enables users to
stay protected against the latest virus, malware, ransomware
and spyware attacks while keeping their identity and privacy
protected and personal.

Q18: Write down some safeguards against malware.


Ans: Safeguard against Malware:

107
Keeping ourselves safe from malware and viruses is mostly in our
hands. More than 90% of computers are infected due to the user's
mistake. Our computers have caught a virus if they start slowing
down, behave unusually, crash during processes or restart several
times, show annoying messages and some of our documents
disappear or become inaccessible. We must avoid this situation to
be created. Some simple measures can prevent our system from
malware and viruses
● Install anti-virus software and keep it updated.
● Run scheduled scans regularly with any anti-virus software.
● Keep our operating system updated.
● Do not click on internet links which have unusual labels,
images or captions.
● Do not open email attachments or click on hyperlinks from
unknown senders.
● Scan USB flash drive, SD cards and mobile phones before
opening.
● Use spam blocking or filtering tools to block unsolicited
emails, instant messages and pop-ups.
● Only download files and programs from trusted sources on
the Internet.
● Never use an open Wi-Fi.

Q19: Describe some steps to recover data.


Ans: Keeping the Backup of Data:
Besides this, we should take some measures to recover data from
any potential loss. Some steps this regard are:
● Create a system restore point regularly and check if it is not
disabled.
● Write imported data on CDs or DVDs. Since they are write-
protected, they do not catch viruses.
● Have the back-up of important files at more than one place.
● We can also have documents on cloud storage like Google
Drive and Microsoft one drive.

Q20: Define authentication mechanism.


Ans: Authentication Mechanism:
The authentication mechanism is the hardware or software-based
mechanic that forces users to prove their identity before accessing
data on a device. The process makes sure the only authenticated
user gets access to data or devices.

108
Q21: Describe the types of security mechanisms.
Ans: Types of Security Mechanism:
There are many ways a computer secured system may authenticate
a user. Some of them are:
i. Username and Password:
A username and a password are the pair of keyboards known
by the user. They are presented to the computer to
authenticate the user. Usernames and passwords are the
default authentication mechanism on the web today.
However, recent large scale computer attacks have made
usernames and passwords unacceptable authentication
mechanisms are needed to fully authenticate. Additional.
ii. Personal Identification Number:
PIN stands for Personal identification Number. It is a security
code for verifying our identity. Similar to a password, our PIN
should be kept secret because it allows access to important
services such as financial transactions and confidential emails.
The PIN provides security when a credit/debit card is lost or
stolen because it must be known before making money
withdrawal or transfer.
iii. Biometric Verification:
Unlike authentication processes, biometrics verification
makes sure that the real person gets access to the data or
device. Biometric authentication relies on the unique
biological characteristics of a person. Biometric authentication
systems capture, detain real-time and compare it with
existing data in the database. If both samples of the diametric
data match, authentication is confirmed. Scanning
fingerprints is the most common way of biometric. However,
some other advanced ways include retinal scans and iris,
facial and voice recognition.
Q22: Describe personal ethics in the computer field.
Ans: Personal Ethics in Computer Field:
Professional ethics involve the personal and corporate principles
and rules that guide behaviors within the context of a profession.
The role of a professional code of ethics is to clarify values and
rules and can be used as a framework for discipline.
Computing professionals' actions change the world. To act
responsibly, they should reflect upon the wider impacts of their
work, consistently supporting the public good. Here are some
guiding principles:
● Contribution to society and human well-being, acknowledging
that all people are stakeholders in computing.
● People are stakeholders in computing.

109
● Be honest and trustworthy.
● Respect the equipment.
● Avoid causing any harm.
● Be fired and act not to discriminate, bully or harass.
● Respect the work required to produce new ideas, inventions,
creative works, and computing artifacts.
● Respect privacy and maintain confidentiality.
● Maintain high standards of professional competence conduct
and ethical practice. Create opportunities for other individuals
or groups to grow as professionals.
● Manage personnel and resources to enhance the quality of
work life.
● Ensure that the public good is the central concern during all
professional computing work.
● Assess computing and communication resources only when
authorized.
● Foster public awareness and understanding of computing,
related technologies & their consequences.

Q23: Define information accuracy. Why is information accuracy


important?
Ans: Information Accuracy:
The information accuracy is the type of measurement that assures
the information is correct and true. It is also necessary that the
information should not be generated from the malicious data. For
information accuracy, the data must be from reputable sources. In
the era of information explosion, we need to be more careful while
using or disseminating information. The use of unreliable sources
results in inaccurate information. Especially, the accuracy of
information shared on social media is often questionable.

Q24: What is an intellectual property right?


Ans: Intellectual Property Right:
When any person develops software, writes a book or research
paper or invents any method or the machine, it becomes the
intellectual property of that person. Intellectual property is
intangible creations of the human intellect. Just like other property
the intellectual property can be stolen. To prevent theft or illegal
use or spread of intellectual property, Intellectual Property Right is
exercised. Through these rights, intellectual property is protected
with the help of copyrights, patents, and trademarks.
They allow creators or owners of patents, trademarks or
copyrighted works to benefit from their work or investment. Under

110
these rights, no other person or organization can copy or reproduce
any other intellectual property. Intellectual property rights are
acclaimed worldwide. In Pakistan, Intellectual Property Organization
(IPO) regulates the matters regarding intellectual property rights.

Q25: Describe patent, copyright and trademark.


Ans:
i. Patent:
A patent is a grant of exclusive rights for an invention to
make, use and sell the invention for a limited period, in
Pakistan 20 years. Owning a patent gives the patent holder
the right to stop someone else from making, using or selling
his or her invention without permission. To protect students
and scholars, the Higher Education Commission also offers
support to get patents registered with Intellectual Property
Organization (IPO). The patentable process or invention must
be novel, possess inventive steps I can use in industries.
ii. Copyright:
Copyright is a legal instrument that provides legal rights to
the creator of artwork, literature, or a work that conveys
information or ideas. In simple words, copyright is the right of
copying. Copyright gives control over how the work is used.
Copyright intends to advance the progress of knowledge by
giving an author of a work an economic incentive to create
new works. The sign is also often displayed on copyrighted
objects.
iii. Trademark:
Trademark identifies a product or services and distinguishes it
from other products and services. Trademarks are protected
by intellectual property rights which identifies that the
product or service belongs to a specific organization. It can be
an easily recognizable word, phrase, logo, or symbol and
often mentioned as TM (Trade Mark). Trademark helps
organizations to market their products and services locally
and globally. Developing trademarks is creative work and can
be done professionally. There are many software available for
developing trademarks.

Q26: What do you know about software piracy?


Ans: Software Piracy:
Software piracy refers to the illegal use, copying or distribution of
copyrighted software. Software piracy is a huge threat to the

111
software industry. It causes a significant loss of revenue for
developers and vendors. Because of piracy, vendors have fewer
resources to devote to research and development of new products.
Since they earn less profit, they are forced to pass these costs on to
their customers. Software companies have tried various techniques
to stop software piracy but most of them have remained
unsuccessful. They applied for copy-protection which demands the
user to enter keys or credentials. Today, most software requires
registration which is mainly online. However, these measures could
not stop software piracy. Using pirated software is also risky for
users. Aside from the legal consequences of using pirated software,
users of pirated software lose some practical benefits as well.
Pirated software may not work properly or stop working at any
time. Furthermore, pirated software users cannot access customer
support, upgrades, technical documentation, training and bug fixes.

Q27: Write a few lines about plagiarism.


Ans: Plagiarism:
Plagiarism is presenting someone else's work or ideas as your own
without full acknowledgment to the author or conceiver. Academic
honesty demands that the users of any ideas. Words and data
should acknowledge the originators. Plagiarism is unethical and can
have serious consequences. Colleges and universities encourage
students to submit their original work and cite the ideas and words
borrowed from any other sources. Failing this may cause serious
penalties. There are online services to check and fix plagiarism
issues. Academic organizations hire the plagiarism detection
service. One of the most popular services is Turn tin.

112
Computer Security & Ethics CHAPTER#
05

A. Choose the Correct Answers:


1. The broad term that encompasses different harmful software is:
(a) Virus
(b) Malware ✔
(c) Adware
(d) Spyware
2. The authentication mechanism that only allows the real person to
access data
or device is:
(a) username and password
(b) PIN
(c) Biometric ✔
(d) Scan code
3. Software are mostly protected under:
(a) Patents
(b) Copyrights ✔
(c) Trademarks
(d) Logos
4. The professional ethics in computer held is important because:
(a) It is necessary by law
(b) Violation can cause serious penalties.
(c) It is useful for financial benefits.
(d) It creates a healthy and positive work environment. ✔
5. Free Antivirus Software often:
(a) Expire after sometimes
(b) Offer only limited service ✔
(c) Cannot be updated
(d) Cannot be purchased
6. Copying and pasting some texts from internet without acknowledging
the real author is an example of:
(a) Plagiarism ✔
(b) Illegal use of patent
(c) Information piracy
(d) Copyright violation
7. Since it does not harm or steal data, the least harmful malware is:
(a) Virus
(b) Adware ✔

113
(c) Spyware
(d) Trojan
8. The malware that replicates itself and doesn't need to attach with any
files is:
(a) Virus
(b) Adware ✔
(c) Spyware
(d) Worm
9. Through which virus spreads?
(a) Email Attachments
(b) Internet Downloads
(c) Flash Disks and CDs
(d) All of them ✔
10. Chick this link and win a $5 voucher at McDonald's. This is an
example of:
(a) Scam
(b) Phishing
(c) Clickjacking ✔
(d) Hacking

114
B. Respond the Following:

i. Why is computer security important? Write any three reasons.


Ans: Computer Security:
"Computer security is the protection against theft or damage to our
computer hardware, software and information present on them from
threat of viruses or unauthorized use."

Explanation: The computer has become an important part of our life.


We store important data on our computers in the shape of documents,
pictures, programs, etc. Therefore, we expect that all our information
must remain safe and our computer runs properly without any
problem.
Few threats can cause problems for our computers. These threats may
be different types of viruses or unauthorized use of a computer. To
prevent our computer from such threats, we need to abide by
computer security.

Reason of Importance of Computer Security:


1. Prevent from viruses and malware:
● Computer security is important for our computer's overall
health.
● It keeps our information protected and helps prevent viruses
and malware, which allows programs to run quicker and
smoother.
2. Secure Private Information:
● It safeguards confidential and sensitive information.
● The advancement in science and technology has changed day
to day activities. We rely on computers and mobile phones,
where we access a lot of information which we do not want to
share with others. This information may include our

115
passwords, banking details, contacts, pictures, etc. To protect
this information we need to make our devices secure so that
no one can damage or access this information without our
consent.
3. Provide Safe Environment:
● Computer Security is important as it enables people to
perform their work in safe environments.
● It helps in the execution of essential business processes.

ii. Explain Cyber Bullying with an example.


Ans: Cyber Bullying or Harassment:
Cyber bullying or harassment is a type of cyber-crime in which
electronic means like a computer, mobile phone or internet are used
for online bullying or harassment.
Example:
● Harmful bullying behavior can include:
● Posting rumors
● Threats
● Passing inappropriate remarks
● Leaking personal information
● Blackmailing
● Committing hate speech

Effect of Cyber Bullying or Harassment on Victim:


● The perpetrator does it with the intent to cause harm to the
victim.
● Victims may experience lower self-esteem, intent to commit
suicide and a variety of negative emotional responses, including
being scared, frustrated, angry and depressed.

iii. Why is information accuracy important?


Ans: Information Accuracy:

116
The information accuracy is the type of measurement that assures the
information is correct and true.
Importance of Information Accuracy:
● Information accuracy is important because inaccurate
information is harmful in different fields like medical history,
Business records, Government data, etc.
● It is necessary that the information should not be generated
from malicious data.
● For information accuracy, the data must be from reputable
sources.
● In the era of information explosion, we need to be more careful
while using or disseminating information. The use of unreliable
sources results in inaccurate information.
● Especially, the accuracy of information shared on social media is
often questionable.

iv. What is Ethical Hacking?


Ans: Ethical Hacking sometimes called as Penetration Testing is an act
of intruding / penetrating into system or networks to find out threats,
vulnerabilities in those systems which a malicious attacker may find
and exploit causing loss of data, financial loss or other major damages.
The purpose of ethical hacking is to improve the security of the
network or systems by fixing the vulnerabilities found during testing.
Ethical hackers may use the same methods and tools used by the
malicious hackers but with the permission of the authorized person for
the purpose of improving the security and defending the systems from
attacks by malicious users.
Ethical hackers are expected to report all the vulnerabilities and
weaknesses found during the process to the management.

v. Your friend has become a victim of cyber harassment. What two pieces
of advice would you give him or her?
Ans: Pakistan is in the list of the fastest-growing countries that are
using the internet. This opens the doors for the fact that cyber bullying
is increasing as well but yet there is no legislation for cyber-crimes in
Pakistan. If my friend becomes the victim of cyber harassment, I will
give him advice that:

117
i. Report To Trusted People:
First thing is to report such incidents to the trusted people that
are highly likely to be parents and teachers.
ii. Complaint Government Authorities:
Write down an application (in English or in Urdu), describe the
complete problem, as much evidence, details as he/she can and
send it to the FIA National Response Center for Cyber Crimes.
OR send an online complaint through the form available on the
website or by calling helpline 1991 which is available 24/7.

vi. Write any two measures to avoid email account hacking.


Ans: Email attachments have been a popular medium to spread
viruses and hack email accounts.
To avoid email account hacking, we should take following measures:
Do not open email attachments or click on hyperlinks from unknown
senders:
● The infected emails may come from an unknown or fake email
address.
● Users must check the origin of the email before opening the
attached files or clicking any link that is given in the email.
● People in our contact list may also send us infected files as they
may not be aware of it themselves.

Spam or junk mails must be checked carefully before clicking


attachment:
● Use spam blocking or filtering tools to block unsolicited emails,
instant messages and pop-ups.
● Do not click on internet links which have unusual labels or
images of captions in spam emails.
● Only download attachments from trusted sources.

vii. How is software piracy harmful for software developers?


Ans: Software Piracy:
Software piracy refers to the illegal copying or distribution of
copyrighted software. Impact of Software Piracy on Software Industry
and developers:
● Software piracy is a huge threat to the software industry and
developers.

118
● It causes a significant loss of revenue for developers and
vendors.
● Because of piracy, vendors have fewer resources to devote to
research and development of new products.
● Since they earn less profit, they are forced to pass these costs
on to their customers.
● Software companies have tried various techniques to stop
software piracy but most of them have remained unsuccessful.
● They applied for copy-protection which demands the user to
enter certain keys or credentials. Today, most software requires
registration which is mainly online. However, these measures
could not stop software piracy.

viii. Give two examples of phishing.


Ans: Example of Phishing:
1. False Emails:
In Phishing, perpetrators contact the target person through email,
telephone or text message and pose as a legitimate and trusted
individual. He or she asks the target to provide sensitive data such
as personally identifiable information, banking and credit card
details and passwords for different reasons.
2. Fake Websites:
In Phishing, perpetrators send phishing emails that include links to
fake websites, such as the mobile account login page or for a
known mail provider, asking the victim to enter their credentials or
other information into the fake site's interface. In both cases, the
information is then used to access different accounts and can result
in identity theft and financial loss.

ix. What is an Intellectual Property Right?


Ans: Intellectual Property:
When any person develops software, writes a book or research paper
or invents any method or the machine, it becomes the intellectual
property of that person. Thus Intellectual property is intangible
creations of the human intellect.
Intellectual Property Right:
● Just like other property the intellectual property can be stolen.
To prevent theft or illegal use or spread of intellectual property,
Intellectual Property Right is exercised.

119
● Through these rights, intellectual property is protected with the
help of copyrights, patents, and trademarks.
● They allow creators or owners of patents, trademarks or
copyrighted works to benefit from their work or investment.
● Under these rights, no other person or organization can copy or
reproduce any other intellectual property.
● Intellectual property rights are acclaimed worldwide.
● In Pakistan, Intellectual Property Organization (IPO) regulates
the matters regarding intellectual property rights.

x. Differentiate between the following on the given criteria.


Ans:

Criteria Virus Worm Adware Spyware

Level of Viruses are Harmful as it Normally, Poses high-


danger harmful. They can do several these are not risk threats.
can range from malicious as dangerous Can
displaying tasks to cause as other completely
irritating damage. malware. shut down
messages to computers, or
make all the permanently
documents erase or
inaccessible or damage files.
even delete
them.

How is it Viruses A worm can Adware is Spyware can


initiated generally latch replicate itself advertising- come through
? on a host file without any supported cookies or
and when they human software or even when we
execute they interaction. It programs install
infect other does not need include software
files or to attach itself games, without
programs. to a file or desktop reading its
program to toolbars or terms and
cause utilities. conditions.
damage. Commonly,
adware is
web- based
and collects

120
web browser
data to
target
advertiseme
nts,
especially
pop- ups.

Damage It can also It can do They present Spyware


that can modify other several endless ads takes control
be done computer malicious and pop-up over a mobile
to data programs, tasks, such as windows that phone or
& insert its own dropping could computer
hardwar code and other potentially without the
e change malware, consume user's
computer copying itself memory and knowledge.
settings. onto devices processing They capture
physically resources. information
attached to Adware can like web
the affected also change browsing
system, the different history, e-mail
deleting files, settings of messages,
and internet usernames
consuming browsers like and
internal homepage passwords
storage and and default and online
memory search payment
resources. engine. information.

Effect Slower Slow down Adware Slowing down


on operating computer annoys the computer
compute speed. performance. user & slows performance
r screen down the & shut down
processing. system.

Means A computer A computer Adware is Spyware can


to virus is a worm spreads advertising- come through
spread computer copies of itself supported cookies or
program that from software. even when we
can spread computer to The install
across computer. advertiseme software
computers and nts produced without

121
networks by by adware reading its
making copies are terms and
of itself, sometimes in conditions.
usually without the form of a System
the user's pop-up or monitors,
knowledge. sometimes in cookie
Boot Sector, little trackers,
Resident, windows that rootkits and
Macro Viruses may not be key- loggers
and File closed. are a few
Infector are examples of
some examples Spyware.
of viruses.

C. Match the Column:

S.N A S.No B C
o

1 Presenting some one’s idea as your a Adware i-e


own without acknowledging the
author.

2 An advertising software that b Cracker ii-a


presents ads & pop-up windows to
spread viruses.

3 Crime that is committed through a c PIN iii-f


computer system.

4 A secretive security code that d Antivirus iv-c


verifies the user's identity.

5 A person that gains unauthorized e Plagiaris v-b


access to other computers by m
passing passwords.

6 A utility software that prevents f Cybercri vi-d


threats & data loss from a me
computer.

122
CHAPTER 6 Web Development CHAPTER# 06

Short & Detailed Questions Answers.


Q1: What is web development?
Ans: Web Development:
Development of web sites and online applications is called web development.
This is done by coding in different languages and by using several web
development tools and frameworks. A complete web application may consist
of a:
● User Interface
● Back-End Server Codes
● A Database
Q2: Define the following terms?
(i) World Wide Web (WWW) (vi) Search Engine
(ii) Web Page (vii) Home Page
(iii) Website (viii) Web Hosting
(iv) Web Browser (ix) Web Server
(v) Uniform Resource Locator (URL)

Ans: Definition of Terms:


i. World Wide Web (WWW):
The word World Wide Web (WWW) is commonly known as the web.
The Web is a collection of computers connected through a network
to provide publicly accessible information.
ii. Web Page:
A web page is a document commonly written in HTML that is
accessible through the internet by using an internet browser.
iii. Website:
A website is a collection of web pages containing text, images, and
all types of multimedia related to a specific set of information. A
website can be accessed through a Uniform Resource Locator
(URL).
iv. Web Browser:
A web browser is a software application for accessing websites on
the World Wide Web.
Example:
Most common web browsers include Microsoft Internet Explorer,
Google Chrome, Mozilla Firefox, and Safari.
v. Uniform Resource Locator (URL):
It is the address of a resource on the internet.
Example: (https://www.google.com).
Components of URL:
It includes the following two components.
a. The protocol used to access the resource (https ://)

123
b. The location of the server (www.google.com)
vi. Search Engine:
A Search Engine is a web-based tool that enables a user to locate
information on the web.
Example: Most popular search engines are Google, Yahoo, and
Bing.
vii. Home Page:
A home page (also known as landing page) is a web page that
serves as the starting point of the website.
viii. Web Hosting:
Web Hosting is a service that allows a web developer to make a
website publicly accessible through the internet.
ix. Web Server:
A web server is the computer that is responsible for serving a
website and all of its content including text and media to a user.

Q3: Describe the different types of website?


Ans: Types of Website:
There are different types of specialized websites such as Portal, News,
Informational, Educational, Personal, Business, Blogs, Forums,
Entertainment and Social.
i. Portal:
A web portal is a website that provides a single access point of
information for all of its users. It collects information from different
sources like emails, forums, search engines and presents it to the
user in a uniform way. Example: Yahoo and MSN are common
examples of web portals.
ii. News:
A news website is the modern-day alternative for newspapers. Such
websites contain everyday information related to current affairs,
sports, politics, weather, health, technology, entertainment, etc.
iii. Informational:
Informational websites provide detailed information of any field.
There are many dedicated informational websites for science, arts,
sports, online training, research, etc.
iv. Educational:
Educational websites are purely designed to deliver educational
material for both teachers and students.
Example: sabaq.pk, khan academy.org, etc.
v. Personal:
A person can share about his or her biography or achievements in a
custom
vi. Business:

124
A business website is the best way for any organization to market
their products and services. It also tells about the teams, policies
and procedures of that business.
For instance:
www.psx.com.pk is the website of Pakistan Stock Exchange.

vii. Blogs:
A blog is a special type of website that is composed of articles and
posts. These articles are organized into categories and sorted by
the time when they were published.
Example: Word press is a popular blog site.
viii. Forums:
A forum is an online place where different users can discuss any
topic. These topics can be categorized so that users can easily
locate topics of their interest.
ix. Entertainment:
An entertainment website serves content like videos or games
purely for the purpose of entertainment.
Example: YouTube is widely used for entertainment.
x. Social:
Social website is a platform where different people get together and
socialize with each other. They can also share their ideas, opinions
and media.
Example: Facebook and Twitter are instances of social networking
websites.

Q4: Define and explain HTML (Hypertext Markup Language)?


Ans: Hypertext Markup Language (HTML):
● HTML stands for Hypertext Markup Language.
● It is a standard markup language for text documents.
● HTML is used to create web pages that are displayed by web
browsers mainly on the internet. HTML consists of a series of
elements. These elements tell the browser how to display the
content.
● It allows the user to create structured content by adding headings,
paragraphs, links, block quotes and other media.
● It takes advantage of simple code structures called tags and
attributes to achieve formatting, graphic and navigation effects on
web pages.

Q5: What are the various steps involved in creating a web page?
Ans: Requirements:

125
Creating a simple web page using HTML is very easy. It requires:
● A text editor
● A file with .html extension
● A web browser to view that page.
Steps Involved in Creating Web Page in HTML:
Step 1: Text Editor (e.g. Notepad):
● Start by simply creating a new blank file in a text editor of your
choice.
● A simple text editor like notepad can be used to start coding HTML
for a web page.

Step 2: Write HTML code in Text Editor:


Example:

Example Explained:
● The <html> element is the root element of an HTML page.
● The <head> element contains Meta information about the HTML page.
● The <title> element specifies a title for the HTML page (which is
shown in the browser's title bar or in the page's tab).
● The <body> element defines the document's body, and is a container
for all the visible contents, such as headings, paragraphs, images,
hyperlinks, tables, lists, etc.
Step 3: Save HTML Page:
● Go to the File menu and click on Save.

126
● Make sure to provide a .html or .html extension for the file being
saved.
● This will save the document as a web page instead of a plain text file.

127
Step 4: View HTML Page in Browser:
● Open the saved HTML file in your default web browser.
● The web browser will automatically translate HTML codes to correctly
display the web page.

Q6: Define and explain HTML tags?


Ans: HTML Tags:
HTML elements are the building blocks of HTML pages.
These elements are defined by placing HTML tags in our document.
These tags are placed inside angular brackets (<>). Here (<) is called
opening
(Start) tag and (>) is called closing (end) tag.
Most HTML tags always require a closing tag while some HTML tags such as
empty tags which mean that they don't require a closing tag.
Some tags also allow further customization by adding attributes to them.

HTML Tag Structure:


An HTML tag has the following structure:

Simple Tag:
<tag-name>content</tag-name>

Tag with Attribute:


<tag-name attribute-name="attribute value">content</tag-name>

Explanation:
● The above syntaxes show:
● The structure of opening a tag
● Defining attribute values
● Placing content inside the element represented by that tag and its
closing structure.

128
Q7: Identify and explain HTML tags used for designing and formatting of the
content?
Ans: HTML Tags for Designing and Formatting of the Content:
Some HTML tags introduce content directly into the web page while others
enhance the design and format of that content.
Some most commonly used HTML tags which change the looks of the web
page are:

TAG DESCRIPTION
<DOCTYPE ● It specifies the HTML version used so the web browsers
html> can show the web page according to HTML standards.
● All HTML documents must start with this tag.
<html> ● All HTML starts with <html> tag & ends with </html>
tag.
<head> ● It is used to define additional information about web
pages.
● It contains a set of tags such as <title>, <meta>,
<style>, <script> etc.
<body> ● The main content of the web page is contained
between <body> & </body>

Titles & Footers:


TAG DESCRIPTION
<title> ● It defines the title of the page.
● Titles are very important as they appear on the top of
the browser window & displayed on search engine
result pages.
<footer> ● It defines the footer for a web page. e.g: Copyright
2020. All rights reserved.

Paragraphs & Line Breaks:


TAG DESCRIPTION
<p> ● It defines a paragraph of text in a webpage.
● It always starts from a new line & adds space before &
after its text.
<br> ● It defines a line break & starts the following content
from a line.
● Unlike <p> tag, it does not add space before or after
break.

129
<hr> ● It draws a horizontal line where it is defined.
● It is used to differentiate between sections of the page.

Headings:
TAG DESCRIPTION
<h1> - ● It is used to define six levels of HTML headings (h1,
<h6> h2, h3, h4, h5, h6) with <h1> being heaviest heading
& <h6> being the lightest heading.

Text Formatting:
TAG DESCRIPTION
<b>, <i>, ● These tags are used to bold, italicize & underline text
<u> respectively.
<pre> ● It is used to define a preformatted text.
● The web browser displays such texts with spaces & line
breaks as defined in HTML codes.
<font> ● It is used to define the font, size & color of its text.
● This tag can be composed with three attributes: size,
color & face.
● This tag is supported till version 4.1 of HTML.
<center> ● It is used to align its text to the horizontal web page.
● This tag is supported till version 4.1 of HTML.
<sub> ● It defines subscript text which is under the baseline of
other text & has a smaller size.
● E.g. H2O
<sup> ● It defines superscript text which is slightly above the
normal line of other text & has a smaller size.
● E.g. E=mc2

Example:

130
Output:

Q8: Define Html lists? How many types of lists can be created?
Ans: HTML Lists:
● HTML lists allow web developers to group a set of related items in lists.
● Lists are very useful in displaying point by point information such as:
to-do list
● List of ingredients for a recipe
● List of categories, etc.
Types of Lists in HTML:
HTML provides three different types of list elements namely:
i. Unordered Lists
ii. Ordered Lists
iii. Description Lists and there is another list name as

131
iv. Nested List (list inside list)

The web browsers automatically add indents, spaces and markers to


HTML lists.

i. Unordered List:
● An unordered list is a list of related items in which the order
of items is irrelevant.
● It is defined by <ul> tag and each of its list items is defined
by <li> tag.
● The web browser will display these list items as bullet points.

ii. Ordered List:


● An ordered list also displays a list of related items.
● It is used where the order of the list is important e.g. names
of students in order of their exam ranks.
● It is defined by <ol> tag and each of its list items is defined
by <li>.
● The web browser will display these list items with numbers
starting from 1 instead of bullet points. Ordered lists can also
be defined with two of its attributes: start and reversed.
● Start attribute defines the starting number of the first list
item.
● Reversed attribute is used to display the list in descending
order.
● The list items for ordered list can also be defined with a value
attribute which is used to place that item at a specific position
or number in the list.

132
iii. Description List:
● Description lists are used to display different terms and their
descriptions just like in a dictionary or glossary.
● It is defined by <dl> tag and each of its list items is
composed of two elements: term and description.
● Term is defined by <dt> tag and its description is defined by
<dd> tag.
● In description lists, a term can have one or more descriptions
and a description can have one or more terms.

133
iv. Nested Lists:
● HTML lists can be nested i.e. list inside list. Such lists are
called nested lists.
● A very powerful feature of HTML lists is their ability to nest
one into another.
● Any of the list types can contain any other list type as its list
item.
● It is defined by placing the new list tag inside the <<li> tag
of the previous list.
● Web browsers automatically indent nested lists and assign
appropriate markers to those nested list items as well.

134
Q9: How are images displayed in an HTML page?
Ans: Image:
● Images give a visual appeal to the websites.
● Sometimes images can present a better understanding than long
and uninteresting texts. Inserting Images in an HTML Page:
● Images can be inserted in an HTML document by using <img> tag.
● This does not create a copy of the image. Instead, it only creates a
reference to the original image placed somewhere in the computer's
storage.
● The <img> tag is an empty tag which means that it does not
require a closing </img> tag.
● It contains five attributes out of which two are required and three
are optional.

Attributes of Image Tag:


attribute Value Description
src URL Define the source of reference of the image file.
Syntax: <img src=”image.jpg”>
Alt Text Defines alternate text of the image.
Syntax: <img src=”image.jpg”
alt=”Introduction”>
width Pixels Defines the display width of the image.
Syntax: <img src=”image.jpg” width=”300”>
height Pixels Defines the display height of the image.
Syntax: <img src=”image.jpg” height=”120”>
border pixels Defines the width of the border to be displayed
around the image. (This attribute is supported till
version 4.1 of HTML)
Syntax: <img src=”image.jpg” border=”2”>

135
Q10: How can the background colour change in HTML?
Ans: Backgrounds:
Backgrounds also give a visual appeal to the websites.
The web browsers display an HTML document with white background by
default. However, this can easily be changed to a different color or even an
image with the help of color and background attributes of the <body> tag.
Background Attributes:
Bg color:
● This attribute is used to change the color of the entire web page.
● Its color value can be defined as RGB code, hexadecimal code or by
color name.
● For instance, to set the background color of the web page to green we
can use any one of these values: rgb(0,255,0): #00FF00: green
● e.g. <body bg color="green">

136
Background:
● This attribute is used to display an image as the background of the
web page.
● Its value will be the reference or URL of the background image.
● e.g. <body background="image.jpg">
(This attribute is supported till version 4.1 of HTML).

Q11: Define a hyperlink? How can we create a hyperlink to an external web


page or within the same web page in HTML?
Ans: Hyperlinks:
● Hyperlinks allow a user to navigate from one web page to another.
● It also enables users to navigate to different sections within the same
web page.
● Hyperlinks convert text or other media into clickable objects.
Definition:
A hyperlink in HTML is defined by <a> tag and its href attribute. The value
of href is the reference of another web page or a different section within the
same page.
Links to external document:
● To send a user to any other web page, use the URL of that page as the
value for href attribute.
e.g. <a href="http://www.google.com">Goto Google</a>
Links within the same document:
Setting the link within the same page requires two steps:
i. Use the id attribute of any HTML tag to give a name to the section
of the page, where a user should reach after clicking on the link.
ii. Create a hyperlink and set the above name as href attribute of this
link, starting with hash (#) symbol.
e.g. <p id="navigate"a>Send user here on click</pa>
<a href="#navigate"a>Go to the linked paragraph</a>

Attributes of Hyperlink Tag:


attribute Value Description
href URL Define the source of reference of the image
file.
Syntax: <img src=”image.jpg”>
name Section Defines alternate text of the image.
Name Syntax: <img src=”image.jpg”
alt=”Introduction”>
target _blank: Defines the display width of the image.
_parent: Syntax: <img src=”image.jpg”
_self: width=”300”>
_top:

137
Frame
name:

Q12: Define the term table and differentiate between rows and columns?
Also describe formatting features and attributes of tables?
Ans: TABLES:
● Tables allow displaying the content (like text, image, and links) in the
form of rows and columns.
● The coordinating place of a row with a column is called a cell.
● These cells contain some content of the webpage.
● In HTML, a table is defined by <table> tag.
ROWS AND COLUMNS:
Rows:
● A row is the collection of all horizontal cells of a table.
● A table can contain any number of rows.
● All the rows in a table have an equal number of cells.
● It is defined by the <tr> tag which is placed inside the <table> tag.
Columns:
● A column is the collection of all vertical cells of a table.
● A table can contain any number of columns as well.
● It is defined by the <td> tag which is placed inside the <tr> row tag.
FORMATTING FEATURES OF TABLE:
Table Heading:
● The HTML table allows defining a header for the columns of our table.
● A header cell is defined by <th> tag and is placed inside a <tr> row
tag.
● It is used to differentiate from the content placed inside normal <td>
data cells.
● To make the entire header row stand out from the rest of the table
contents, define <th> tags for all columns of the first <tr> row tag of
any <table> tag.
Table Data:
The content is placed inside a cell in a table by using <td> table data tag. A
cell can contain any type of data such as text, image, media, link, etc.

Table of Attributes:
Attribute Value Description
Align Left: Specifies the alignment of a table according
Center: to surrounding text.
Right

138
Width Pixels: Specifies the width of a table.
%
Border 1 or 0 Enables or Disable the border around the
table.
Cell padding Pixels Specifies the space between the edge of the
cell & the content inside.
Cell spacing Pixels Specifies the space between cells.

All the above attributes supported till version 4.1 of HTML.


Cells Attributes:
attribute Value Description
Align Left: Specifies the alignment of the content
Center: inside the cell.
Right
VAlign Top: Vertically aligns the content in a cell.
Middle:
Bottom:
Baseline
Col span Number Specifies the number of columns a cell
should merge into.
Row span Number Sets the number of rows a cell should
merge into.

All the above attributes supported till version 4.1 of HTML.


Note:
In example:
(.html document will always written as):
<!DOCTYPE html>
<html>
<body>
<h5>Heading here </h5>
<table>Table content here</table>
</body>
</html>

139
140
Q13: Define a frame and framesets? Also describe their attributes in HTML?
Ans: FRAMES:
● HTML frames are powerful elements which allow displaying the
contents of another HTML document within a web page.
● A web page can be divided into multiple sections and each section can
display all contents from a different web page by using frames.
● It is defined by <frame> tag.
● The src attribute is used to provide the reference URL of another web
page to be displayed in this frame.

Attribute of Frame:
Attribute Value Description
src URL Defines the URL of the page which should be
displayed in the frame.
Margin Pixels Defines top & bottom spaces of a frame.
height
Margin width Pixels Defines left & right spaces of a frame.
no resize No resize Defines if the user can change the frame size
or not.
scrolling Yes: Defines if the scroll bar should be displayed
No: in the frame.
Auto

HTML frames and framesets are supported till version 4.1 of HTML

FRAMESETS:
● Framesets define how a web page is divided into rows and columns to
display multiple frames on that web page.
● It is defined by <frameset> tag and contains one or more <frame>
tags.

Attribute of Frameset:
Attribute Value Description
Cols Pixels: Defines the number & the size of frame
% columns.
Rows Pixels: Defines the number & the size of frame rows.
%

141
Q14: List out some popular text editor and other different tools which help in
designing and development of websites?
Ans: Web Designing Tools:
Following is the list of some of the tools that help in designing and
developing a website:

● Microsoft FrontPage
● Corel Draw
● Adobe Dreamweaver
● Word press
● Microsoft Visual Studio
● Wix
● Figma
● Coffee Cup HTML Editor
● Adobe XD

142
Web Development
CHAPTER# 06

A. Choose the Correct Answers:


1. The service that is responsible for making websites publicly accessible
through the internet is called:
(a) Web Server
(b) Web Hosting ✔
(c) Web Site
(d) Web Browser
2. The type of special website where different users can ask questions and
give answers or discuss on various topics is called:
(a) Social site
(b) Blogs site
(c) Forums site ✔
(d) Informational
3. Entertainment site specializes in delivering:
(a) News, weather and current affairs
(b) Information about products and services of a business
(c) Personal information of a particular person
(d) Content like videos, images and games for entertainment ✔
4. A web browser will translate the codes in a web page if the extension of
the document is:
(a) .html ✔
(b) .txt
(c) .doc
(d) .pdf
5. The tag used to automatically add line space before and after the
containing
text is:
(a) <br>
(b) <hr>
(c) <p> ✔
(d) <pre>
6. The type of list which shows its items in a numerically ordered sequence
is:
(a) Nested List
(b) Unordered List
(c) Ordered List ✔
(d) Description List

143
7. To create a clickable text which navigates to another page or section, we
use:
(a) <input> tag
(b) <li> tag
(c) <b> tag
(d) <a> tag ✔
8. To differentiate the heading cells from rest of the data in a table, we use:
(a) <th> tag ✔
(b) <tr> tag
(c) <td> tag
(d) <dt> tag
9. The tag used to define the title caption of the web browser is:
(a) <head>
(b) <thead>
(c) <title> ✔
(d) <h1>
10. The attribute used to define the URL for reference of image in <img>
tag is:
(a) target
(b) name
(c) src ✔
(d) href

144
B. Respond to the Following:
1. Differentiate Between Web Hosting & Web Server.
Ans: Differentiate Between Web Hosting & Web Server:

Web Hosting Web Server


1 A web hosting is a service that A web server is an entity that
has access to an internet accepts requests via HTTP or a
server. It is sold by specific similar protocol and generates
companies called "web a response to access any
hosters". They rent their website. It can be numeric in
servers to their customers, the case of an Apache web
allowing them to create their server program, or physical,
websites. as a dedicated machine
(computer which runs
software).
2 Web host types are shared Web servers can be of
host, dedicated host, free host different types such as proxy
and reseller host among servers, mail servers,
others. applications servers and
others.
3 A web host uses multiple A web server receives data
network devices, such as and performs all the
switches and routers to relay operations before returning
information from servers and their results to clients. When
to servers. Web hosts store any server whether a physical
multiple servers in multiple or a software server receives a
data centers and also helps in request then after that it takes
managing data (hardware and the help of the related
software) properly for their database and then fills the
customers. HTML files with all the recently
received information which
has been generated.
4 Example: a web host is a Example: Web servers like
group of companies such as 145 Google Web server,
Apache,
HostGator, Go daddy Hosting, etc. run the software. We can
BlueHost, and so many more also call this software a web
hosting companies. server.
2. What are the steps involved in creating a complete website?
Ans: Steps Involved In Creating a Complete Website:
The steps involved in creating a complete website are following:
● First of all, I need to plan a website. (E.g. Educational, business,
social, entertainment, blog or news etc.)
● Choose a domain name. Domain name is website name and
address (extension). E.g. google.com, w3schools.com etc.
● Register domain name. (Common extensions for registration
are .com, .net, .org, .uk etc.) Tip: Check availability of name
through bluehost.com or godaddy.com or any other web host
service.)
● Choose a hosting service. (e.g.: godaddy.com, Bluehost.com
etc.)
● Connect domain name to web host. 6. Then, Design a website.
(choose theme or template of website according to the type of
website)
● After designing. Add pages, navigation menu and content etc.
● Test website.

3. How can a user be redirected to another webpage?


Ans: Hyperlinks:
● Hyperlinks allow a user to navigate from one web page to another.
● It also enables users to navigate to different sections within the same
web page.
Links to external document:
● To send a user to any other web page, use the URL of that page as the
value for href attribute.
● e.g. <a href=”http://www.google.com”>Goto Google</a>

4. Is it possible to display the entire contents of another web page in


our HTML page? How?
Ans: Yes , it is possible to display the entire contents of another web
page in our HTML page by using tag <iframe> in html.
iframe:
● An iframe or inline frame is used to display external objects
including other web pages within a web page.
● An iframe pretty much acts like a mini web browser within a web
browser. Also, the content inside an iframe exists entirely
independent from the surrounding elements.
● The basic syntax for adding an iframe to a web page can be
given with: <iframe src="URL"> </iframe> The URL specified in
the src attribute points to the location of an external object or a
web page.

146
Example:
The following example displays "Wikipedia website" inside an iframe in
the current document.

C. Match The Following:


S.N A S.No TAG C
o. .
1 E-Commerce a Add navigation support to web i-e
pages
2 <head> b Organize information as list points ii-d

147
3 <ul> <ol> c Organize information in rows & iii-b
<dl> columns
4 <tables> d Contains additional information & iv-c
styling features of the webpage.
5 <img> e Business website v-f
6 Hyperlinks f Add images & info graphics to the vi-a
webpage.

CHAPTER 7 Introduction to Database System Short & Detailed


Questions Answers.
Q1: Define term database system?
Ans: Database:
A database stores data in organized form. Generally, a database is an
electronic system that facilitates easy access, manipulation and updating of
data. A database is composed of tables which contain rows and columns.
These rows and columns are called records and fields respectively. Most
databases contain multiple tables.
For example:
A general store database may include tables purchase, sales and stock
records. Each of these tables has different fields that are relevant to the
information stored in the table.

Q2: Define terms records and field


Ans: A database is composed of tables which contain rows and columns.
These rows and columns are called cords and fields respectively.

Q3: Describe the advantages of databases.


Ans: Use of Database:
Nowadays, everyone IS familiar with the term database; it is a
mathematically developed data structure which converts raw input data into
meaningful information for a particular organization. These days, databases
can be seen in every field of life, for example in industries, health,
agriculture, schooling, business and banking. The databases can be
developed according to the size of its records for a particular organization.
Databases can be small in size with a few records or very large like NADRA
(National Database Registration Authority) databases which keep millions of
records.
Advantages of Database:

148
A database is playing a leading role to enhance the efficiency and
performance of any organization. The goal of the database is to minimize the
loss and increase the productivity and efficiency of any organization in the
age of information technology.

Q4: Discuss the use of databases in business with examples.


Ans: Use of Database in Business:
Businesses use their databases to:
● Keep track of basic transactions.
● Provide information that will help the company run the business more
efficiently.
● Help managers and employees make better decisions.
Businesses run on databases. These repositories of organized information
can store virtually every kind of data imaginable, and they can sort that
information and deliver it to us with a click of a mouse. Business databases
help business owners organize and track their customers, inventory &
employees.

Example - Customer Relationship Management:


A customer relationship management (CRM) database can help a small
business manage the lifeblood of its business - its customers. A CRM
database organizes all the information a company has about its accounts,
contacts, leads and opportunities. A single customer's record may include his
contact details, the date and amount of his last order, the total amount of
his purchases for the last year, a list of his favorite products and the
products he returned, details of customer service calls and more. Databases
can also be used to manage marketing and promotions, to export email
addresses and to prepare shipping labels.

Q5: What is the flat file system?


Ans: Flat File System:
Early databases were relatively "flat", which means they were limited to
simple rows and columns, like a spreadsheet. A flat file is the older version
of the database. It stores data in a single table structure. Flat file databases
are usually in plain text format, with only one record per line. The fields
included in the record are separated using delimiters such as tabs or
commas.

Q6: Describe database management system and name some popular DBMs.
Ans: Database Management System (DBMS):
Databases are usually developed, maintained and controlled by the Database
Management System (DBMS). The DBMS essentially serves as an interface
between databases and end users or application programs, ensuring that
data is consistently organized and remains easily accessible.

149
Examples:
Here are some examples of popular DBMSs used these days:
● MySQL
● Oracle
● Microsoft SQL Server
● MongoDB
● Visual FoxPro
● IBM Db2
● PostgreSQL

Q7: Why is Database Management System preferred over Flat File System?
Ans: Advantages of Database Management System over the Flat File
System:

DBMS FLAT FILE SYSTEM


1 DBMS Multiple users can access Only one user can access at a time
simultaneously
2 Capable of handling huge sets of Suitable only for smaller sets of
data data
3 Allows non-duplication and Increases duplicate & redundant
integrity data
4 Supports online access Does not support remote
connections
5 Good for small, medium & large Limited only to smaller data
business management needs.

Q8: Describe the characteristics of the database management system.


Ans: Characteristics of Database Management System:
A DBMS is a modern version of database designing, organization and
manipulation. This mainly offers the solutions which a flat file system could
not provide. The DBMS has many characteristics. Some of them are:

1. Multiple users can access DBMS and can view, add, edit and delete
records.
2. A DBMS offers tools like Queues, Views and Forms which help users to
manipulate data easily and more efficiently.
3. A DBMS is more secure and reliable.

150
4. DBMS allows distribution of data in multiple tables by making use of
features like keys and relationships between fields of those tables.
5. This allows lesser duplication of data and results in lesser redundancy.
6. Preparing backups and providing limited permissions to the features of
DBMS.
7. DBMS can handle large and complex data more conveniently.
Therefore, it is preferred by medium and large organizations.

Q9: Define and describe the basic components of DBMS.


Ans: Basic Components of DBMS:
The basic components of DBMS are discussed below:
i. Table:
It is a collection of data elements organized in the shape of rows
and columns. A contact list may be one of the simplest examples of
a table. The marks record prepared by a class teacher is also an
example of a table.
ii. Field:
It is the smallest component in a database. It is where the actual
data is stored during data entry. All data fields in the same table
have unique names. Fields are also called attributes or columns.
Multiple fields make up a data record, several data records make up
a data record, several data records data tables, and several data
tables make up a database.
iii. Record:
A single entry in a table is called a record. Records are also referred
to as tuples rows. A record is made up of two or several data items
which are also called tuples in a table representing a set of related
data. For example, the given student table has four
tuples/records/rows.
iv. Data Types:
All fields in a table must have some data type. Data type is a data
storage format that can contain a specific type or range of values.
The data type of a field is a property that tells what kind of data
that field can hold. Here are some basic data types.

Data Type Description Examples


Integer Holds only whole numbers
Floating Holds numbers with decimal point 5.6, 3.14,
Point 554.9
Character Stores only one character A, B, c, d
String Can store a combination of numbers, letters Pakistan
& special characters. Computer,
@admin
Boolean Can hold only Boolean values i.e., true or 1,0

151
false
Date & Stores data & time in specified format. 01-01-2020
Time 11:30

Different DBMA Offer different range of data types t Examples 145, -35,
74586 5.6, 3.14, 554.9 A, B, c, d Pakistan Computer, @admin 1,0 stored.
For example, MS Access allows a range of whole numbers from -32768 to
32767 for an "Integer". In modem DBMS, choosing proper Na blots of om
sure that database runs faster

v. View:
In a database the data is stored in tables. However, we can see
that data through views. Views do not store data and just show the
information virtually. They have the ability to fetch data from
different tables. Views maintain the security of data and ensure that
no changes occur in the original data.

Q10: Why is it important to carefully decide the data type for each field?
Ans: A data type determines the type of data that can be stored in a
database table column. When we create a table, we must decide on the
data type to be used for the column definitions. We can also use data
types to define variables and store procedure input and output
parameters. We must select a data type for each column or variable
appropriate for the data stored in that column or variable. In addition, we
must consider storage requirements and choose data types that allow for
efficient storage.
Choosing the right data types for our tables, stored procedures, and
variables not only improves performance by ensuring a correct execution
plan, but it also improves data integrity by ensuring that the correct data
is stored within a database. The data types of the fields determine what
kinds of values we can store in them. If a field should only store a whole
number, declaring it as an INTEGER
prevents us (or a buggy piece of software) from writing some arbitrary
nonsensical string into it, for example. The data types of the fields also
affect what operators and functions we can apply to them in queries. For
example, we can take a substring of a string or convert a string to UPPER
CASE, but we can't do either of those with a number. On the other hand,
we can do arithmetic with numbers (add them, multiply them, etc.),
calculate the average, and so on. The data type is also important when
we ask the database to sort our result set. If we sort by a numeric
column, it will sort numerically (smallest numbers first, or largest first if
we specify that it should sort descending). If we sort by a string column,
it will sort 'asciibetical' (character by character, with numbers coming
before letters, like "apple", "banana", "carrot"; this can give us surprising

152
and usually unhelpful results for strings containing numbers since "9"
sorts after "152", because '1'<'9').

Q11: Describe the steps for creating a table using design view in MS Access.
Ans: Steps for creating a table using Design View:
1. To create tables in Access using "Design View," click on the Create tab
and click on the Table icon. Then pull down the
View menu and choose Design View.
2. A new table then appears in the Table Design
View. Note that the default name assigned to the
table is Table 1.
3. Type the name of a field into the "Field Name"
column.
4. Then Use the drop-down menu in the "Data
Type" column to assign the field a data type.
5. If desired, type a description of the data stored in this field.
6. Repeat steps 4 and 5 until we have created all of the necessary table
fields. An example of a Table may be the Customer Table that has the
following entries.

Field Data Description


Name Type
Customer Number The Unique identifier for a
ID customer
First Name Text The First Name of a
customer
Last Name Text The Last Name of a customer
Address Text The Address of a customer

7. Click the "Save" button in the Quick Access toolbar.


8. Then type a name for the newly created table and click "OK"

Q12: Write down the steps for creating a query of view using Design view in
MS Access.
Ans: Steps for creating a query of view using Design View:
i. To make a query in the design view, click on the "Create" tab in the
Ribbon and pull down the "Queries" group and click on the "Query
Design" button.
ii. In the "Show Table" dialog box, add the table or tables that you want
to add to the query design view. Next, add the fields from these tables
that we want to view in our query results or view. If we want to add all

153
of the fields of a table into our result set, we can click and drag the
first field in the table, shown as an asterisk.
iii. Once we have added all the necessary tables and fields to the query
view, click the "Close" button in the "Show Table" dialog box to or
close it and display the query design view.
iv. To run a query and view the result set, we can click the. "Run" button
in the "Results" group of the "Design" tab and the "Query Tools"
contextual tab on the office Ribbon.
v. The result set looks like a table. This result set is a defection of data
from the selected fields of the tables. It is also known as a view.
vi. Click the "Save" button in the Quick Access toolbar. Type a name for
our view and click "OK" to save the query.

Q13: What is the difference between Design View and Datasheet View?
Ans: Difference between Design View & Datasheet View:

DESIGN VIEW DATASHEET VIEW


Design View Design view allows us Datasheet View Datasheet view

154
to create or change the table, form, shows the data in the database. It
or other database object, and also allows us to enter and edit the
configure the fields data. It does not let us change the
format of the database, other than
minor changes (such as column
widths)

Q14: What is data modeling? Name its important components.


Ans: Data Modeling:
Data modeling is the process of developing conceptual presentation of data
objects and their relations. Data models are used to express how the
information will be stored in the database. This helps to identify the most
important fields and remove the irrelevant data. Data models can be used by
database developers to create a physical database. This saves a lot of time
and efforts of developers. There are three most important components of
data models.
i. Entity
ii. Relationship
iii. Referential Keys

Q15: Define relationship and its types.


Ans: Relationship:
When the database structures grew and became more complex, a lot of data
started to become redundant which means that data was being
unnecessarily duplicated. This created a need to connect data entities
instead of repeating the same data m multiple tables. This resulted in the
creation of relationships and Relational Database Management Systems
(RDBMS).
A relationship defines the connection between two tables. It creates a
connection from an attribute of one entity with an attribute of another
entity. Three types of relationships can be defined between entities.
i. One to One Relationship:
This type of relationship defines that a record in one entity can be
connected to only one record in another entity. This is not a very
common type of relationship because the data from related entities
can directly be placed in a single entity. However, this type of
relationship is used to divide larger entities into smaller ones.
ii. One to Many Relationship:
This type of relationship defines that a record in one entity can be
connected to many records in another entity. This is the most
common type of relationship used in relational databases. This
relationship can also be seen as a Many to One Relationship.
iii. Many to Many Relationship:

155
In this type of relationship, one or more records of one entity are
connected to one or more records of another entity. Usually, a third
entity known as a "junction table" is used to create the many-to-
many relationship between two related entities.

Q16: Define entity with examples.


Ans: Entity:
In literal sense, an entity is any individual object which has its own qualities
and properties. In database terms, an entity is an independent table and its
fields are known as attributes. As an example, a payroll database will
contain an entity named Employees. The Employees entity will contain
various attributes like Employee ID, Name, Designation, salary, etc.

Q17: What are referential keys? Describe its types.


Ans: Referential Keys:
The relationships are configured by using referential keys on entities. The
keys determine a certain set of rules that must be followed by the data
stored in a field of an entity. In larger databases, keys are very important to
uniquely identify a specific record.
keys are most commonly used in RDBMS:
i. Primary Key: A primary key is used to uniquely identify a record in
an entity. When a primary key is applied to any attribute in an
entity, it forces the rules of Primary Key onto that attribute. These
rules are:
The attribute (field) must contain a unique value to identify a
record. A unique value means that two records in the same entity
cannot have the same value stored in this attribute where Primary
Key is applied.
The value of the attribute where Primary Key is applied cannot be
null.

ii. Foreign Key:


A foreign key is used to define the connection or relation between
two entities. The foreign key of one entity is configured to be
connected to the primary key of another entity. When a foreign key
is applied on an attribute, it enforces that the value for that
attribute should match any record in the related entity having a
primary key.

Q18: Write three benefits of using relationships in the database.


Ans: A relationship is an important component of a relational database.
It establishes a connection between a pair of tables that are logically related
to each other. A pair of tables is logically related via the data each contains.

156
It helps to further refine table structures and minimize redundant data. As
we establish a relationship between a pair of tables, we will inevitably make
minor modifications to the table structures. These refinements will make the
structures more efficient and minimize any redundant data that the tables
may contain.
It is the mechanism that enables us to draw data from multiple tables
simultaneously.
A properly defined relationship ensures relationship-level integrity, which
guarantees that the relationship itself is reliable and sound

Q19: What is Entity Relationship or ER Model?


Ans: Entity Relationship or ER Model:
Entity Relationship Model (ERM) or Entity Relationship Diagram (ERD)
describes the entities, attributes and relationships with their types in a
simplified diagram. This model or diagram can itself be used as the reference
for designing an actual database. It can even be used as a backup for the
structure of a database. The ERD can be used in two ways:
i. When the database has not been created yet. The ERD helps in
creating a clear representation of the entire database based on user
requirements.
ii. When an existing database needs to be documented. The Database
development tool features automatic creation of ERD based on
existing databases which facilitates documentation.

Q20: Write steps to design ER Model.


Ans: Steps to design ER Model:
i. Identify and design the entities based on the requirements of its users.
ii. Identify and design the attributes within the required entities.
iii. Identify the relationships required between entities.
iv. Design Primary Keys in interrelated entities.
v. Design Foreign Key relationships based on requirements and bin
previously created Primary Keys. Generate an automated Entity
Relationship Diagram.

Q21: Give examples to better understand relationship and referential keys.


Ans: Understanding Relationship and Referential Keys:
The figure given shows four tables and their fields.

157
Students table is used to store personal information of individual students. It
has an Id field set as Primary Key. It also has a Class-Id field to set up a
One-to-One foreign key relationship with the Class table.
Class table is used to store information about classrooms in a school. It has
an Id field set as a Primary Key. A student can be enrolled in only one class;
hence, the Students table has a One-to-One relationship with the Class
table. However, many teachers can be associated with many classes. This
requires a Many-to-Many relationship between Class and Teachers tables.
Teachers table is used to store personal information about a teacher. It has
an Id field set as a Primary Key. Many classes can be taught by many
teachers. This requires a Many-to-Many relationship between Teachers and
Class tables.
Teachers Class table is used as a junction table to facilitate the Many-to-
Many relationship between Teacher and Class tables. It also contains an Id
field set as Primary Key. The other two fields are used to define which
teachers are associated with which classes. It creates a One-to-Many
relationship with each of the two connected tables. Teachers and Class
tables use their Teachers Class Id field's foreign key relationship to fetch the
related information from this table.

158
Q22: Describe the components of the ER diagram.
Ans: Components of ER Diagram:
ER Design is made up of different components like attributes, relationships,
etc. There are defined symbols and shapes to represent each one of them.
Some of the shapes used to define these components are:

A rectangle is used to define an entity. This


can be any real-world object like Student,
Teacher, Class, etc.

An ellipse defines an attribute of an entity.


One entity may contain multiple attributes
and are defined by multiple ellipses

Relationships are symbolically represented by


diamond shapes. It simply states the type of
relationship between two entities.

1 1 Connecting lines show the type of relationship


between two entities. These lines are
1 annotated by 1 or M (stands for Many) at
M their ends to describe the type of relationship.

Q23: Give an example of ER Model.


Ans: For example, a sample ERD for the statement "A writer creates a novel
and consumer buys a novel" is given below.
Here in this example, diagram shows that:
Entities are in rectangular
i. Writer
ii. Consumer
iii. Novel
Relationships are in Diamond Shape
i. Create
ii. Buys

159
Q24: Discuss the importance of ERD in business.
Ans:
i. Entity relationship diagramming is functional as a method of better
visualizing data. Every manager of a multinational enterprise knows
that spreadsheets are pretty much useless when it comes to
understanding the overall picture of their entity's operations and
how they are structured in relation to each other. This is because
human beings do not generally learn and process by mere letters
and numbers nearly two-thirds of all human beings learn and
memorize visually, through seeing the information presented in an
accessible form.
Visually ERD takes advantage of the basic learning strategy that's
programmed into our minds by extending the programming into
compatible and digestible visualizations of the relationships making
up our entity. Software applications that diagram entity
relationships are meant to make those relationships come to life on
the screen (and in our mind), thus making them much easier to
understand.

ii. It's only with ERD software that senior management, board and
stockholders will be able to assess the whole business and to plot a
viable strategy. Basically, an ERD's function is to bring all of that
data stored in our servers to life so we can make sense of it.
An ERD tells a story about our entity's current state. Stories are
how we learn the best, so it's also an essential part of how we
analyze events and plan for the future. So diagramming should not
only show what the current state of affairs is, but it should also
show the potential ways structures and organizations within an
entity can be altered and the potential effects of these changes. For
groups that operate with hundreds or thousands of interconnected
entities on a multinational scale, we can see how, without
visualization, nothing would make sense.

160
Introduction to Database System CHAPTER# 07

A. Choose the Correct Answers:


1. Which of the following Microsoft Office packages is a DBMS?
(a) MS-Word
(b) MS-Excel
(c) MS- Power Point
(d) MS-Access ✔
Chapter – 7
2. The basic limitation of a flat file database is that:
(a) It is complicated
(b) It stores data in a single file
(c) It is very heavy ✔
(d) It is not supported on internet
3. In a database table of "Students", the address of the student will be a:
(a) Record
(b) Field
(c) Entity ✔
(d) Data type
4. In a database table of "Students", the particulars of a single student
will be a:
(a) Record ✔
(b) Field
(c) Entity
(d) Data type
5. In a relational database, keys are used to create a:
(a) Table
(b) Fields
(c) Records
(d) Relationship ✔

161
6. A field that stores the names of students should be defined as:
(a) Integer
(b) Float
(c) String ✔
(d) Boolean
7. A key that allows only unique entries in a field is called:
(a) Primary Key ✔
(b) Secondary Key
(c) Foreign Key
(d) Super Key

8. Data Redundancy means:


(a) Duplication of Data ✔
(b) Variety of Data
(c) Size of Data
(d) Data Type
9. The relationship that matches one record of an entity with only one
record of
another entity is called:
(a) One-to-One relationship ✔
(b) One-to-Many relationship
(c) Many-to-One relationship
(d) Many-to-Many relationship
10. The shape that is used to represent an attribute in an ERD is:
(a) A diamond
(b) An octagon
(c) A rectangle
(d) An ellipse ✔

162
B. Respond the Following:

1. What is the difference between table and view?


Ans: Basic Components of DBMS:
The basic components of DBMS are discussed below:
i. Table: It is a collection of data elements organized in shape of rows
and columns. A contact list may be one of the simplest examples of
a table. The marks record prepared by a class teacher is also an
example of a table.
ii. View: In a database the data is stored in tables. However, we can
see that data through views. Views do not store data and just show
the information virtually. They have the ability to fetch data from
different tables. Views maintain the security of data and ensure that
no changes occur in the original data.

2. Explain entities, attributes and relationships with one example of each.


Ans: Entity:
In literal sense, an entity is any individual object which has its own
qualities and properties. In database terms, an entity known as
attributes.
For example:
A Payroll database will contain an entity named Employees.
Field or Attributes:
Fields are also called attributes or columns. It is the smallest
component in a database. It is where the actual data is stored during
data entry. All data fields in the same table have unique names.
Multiple fields make up a data record, several data records make up a
data table, and several data tables make up a database.
Relationship:
When the database structures grew and became more complex, a lot
of data started to become redundant which means that data was being
unnecessarily duplicated. This created a need to connect data entities
instead of repeating the same data in multiple tables. This resulted in
the creation of relationships and Relational Database Management
Systems (RDBMS).
Definition:
A relationship defines the connection between two tables. It creates a
connection from an attribute of one entity with an attribute of another
entity.
Types:
Three types of relationships can be defined between entities:
One to One Relationship:

163
This type of relationship defines that a record in one entity can be
connected to only one record in another entity. This is not a very
common type of relationship because the data from related entities
can directly be placed in a single entity. However, this type of
relationship is used to divide larger ones.
Example:
Student table is used to store personal information cities into smaller
individual students. It has an Id field and a Class Id field to set up a
One-to-One relationship between student and class table.
One to Many Relationship:
This type of relationship defines that a record in one entity can be
connected to many records in another entity. This is the most common
type of relationship used in relational databases. This relationship can
also be seen as a Many to One Relationship.
Example:
Teachers and Tea relationship. class tables use to creates a One-to-
Many
Many to Many Relationship:
In this type of relationship, one or more records of one entity are
connected to one or more records of another entity. Usually, a third
entity known as a "junction table" is used to create the many-to- many
relationship between two related entities.
Example:
Many teachers can be associated with many classes. This requires a
Many- to-Many relationship between Class and Teachers tables.

3. Write any two statements from the following ER Diagram.

Ans: In above diagram,

164
i. Entities are in rectangular boxes:
(a) Company
(b) Advertisement
(c) Candidate
(d) Interview
ii. Relationships are in Diamond Shape:
(a) Releases = Company releases Advertisement
(b) Applies for = Candidate applies for company (job), Candidates
applies
for advertisement
(c) Faces = Candidate faces interview
(d) Takes = company takes interview

C. Match the Column:

S.No A S.No. B C
.
i. Primary Key a. Attributes i-b
ii. Integer data b. Always unique value in ii-d
field
iii. Relationship c. Data in plain text form iii-c
iv. Field d. Number without decimal iv-a
point
v. View e. Connection between two v-f
tables
vi. Flat File System f. Shows virtual data vi-c
vii. Entity g. Table with its own vii-
attributes g

165

You might also like